<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2026-04-15T04:45:20</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:1" version="1" class="patch">
	<metadata>
		<title>bugfix update for CVE-2020-35452 for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<description>
CVE-2020-35452 for httpd		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35452">CVE-2020-35452 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881415" comment="httpd-2.4.6-99.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881416" comment="httpd-devel-2.4.6-99.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881417" comment="httpd-manual-2.4.6-99.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881418" comment="httpd-tools-2.4.6-99.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881419" comment="mod_ldap-2.4.6-99.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881420" comment="mod_proxy_html-2.4.6-99.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881421" comment="mod_session-2.4.6-99.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881422" comment="mod_ssl-2.4.6-99.el7_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2" version="1" class="patch">
	<metadata>
		<title>The equivalent of RHSA-2024:5930: CVE-2024-1737, CVE-2024-1975 fixes  (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="1231274" ref_url="https://bugzilla.suse.com/1231274" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1737" ref_url="https://www.suse.com/security/cve/CVE-2024-1737/" source="CVE"/>
		<reference ref_id="CVE-2024-1975" ref_url="https://www.suse.com/security/cve/CVE-2024-1975/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5930. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2024:5930		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231274">SUSE bug 1231274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1737/">CVE-2024-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1737">CVE-2024-1737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1975/">CVE-2024-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1975">CVE-2024-1975 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945509" comment="bind-9.11.4-26.P2.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945510" comment="bind-chroot-9.11.4-26.P2.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946141" comment="bind-devel-9.11.4-26.P2.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946142" comment="bind-export-devel-9.11.4-26.P2.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946143" comment="bind-export-libs-9.11.4-26.P2.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945514" comment="bind-libs-9.11.4-26.P2.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946144" comment="bind-libs-lite-9.11.4-26.P2.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945516" comment="bind-license-9.11.4-26.P2.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946145" comment="bind-lite-devel-9.11.4-26.P2.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946146" comment="bind-pkcs11-9.11.4-26.P2.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946147" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946148" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945521" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945522" comment="bind-sdb-9.11.4-26.P2.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945523" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945524" comment="bind-utils-9.11.4-26.P2.el7_9.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3" version="1" class="patch">
	<metadata>
		<title>enhancement update: CVE-2024-5564 for libndp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-5564" ref_url="https://www.suse.com/security/cve/CVE-2024-5564/" source="CVE"/>
		<description>
The enhancement update for libndp to fix CVE-2024-5564		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5564/">CVE-2024-5564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5564">CVE-2024-5564 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879076" comment="libndp-1.2-10.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879077" comment="libndp-devel-1.2-10.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4" version="1" class="patch">
	<metadata>
		<title>unzip security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<description>
This update provides the following security fix for unzip:
- Fixes for CVE-2014-8139, CVE-2014-8140, CVE-2014-8141, and CVE-2014-9636
          		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8139">CVE-2014-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8140">CVE-2014-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8141">CVE-2014-8141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9636">CVE-2014-9636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820085" comment="unzip-6.0-14.el7.PTF.920871 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<description>
This update provides the following security fix for openssh:
- bsc#1122802: Fix to CVE-2019-6111.
          		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820087" comment="openssh-7.4p1-16.el7.PTF.1122802.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820088" comment="openssh-askpass-7.4p1-16.el7.PTF.1122802.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820089" comment="openssh-cavs-7.4p1-16.el7.PTF.1122802.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820090" comment="openssh-clients-7.4p1-16.el7.PTF.1122802.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820091" comment="openssh-keycat-7.4p1-16.el7.PTF.1122802.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820092" comment="openssh-ldap-7.4p1-16.el7.PTF.1122802.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820093" comment="openssh-server-7.4p1-16.el7.PTF.1122802.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820094" comment="openssh-server-sysvinit-7.4p1-16.el7.PTF.1122802.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820095" comment="pam_ssh_agent_auth-0.10.3-2.16.el7.PTF.1122802.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:6" version="1" class="patch">
	<metadata>
		<title>security update for fwupdate (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<description>
SLES Expanded Support platform 7 update: security update for fwupdate		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820096" comment="fwupdate-12-5.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820097" comment="fwupdate-devel-12-5.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820098" comment="fwupdate-efi-12-5.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820099" comment="fwupdate-libs-12-5.el7_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:7" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<description>
SLES Expanded Support platform 7 update: security update for grub2		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820100" comment="grub2-2.02-0.85.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820101" comment="grub2-common-2.02-0.85.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820102" comment="grub2-efi-ia32-2.02-0.85.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820103" comment="grub2-efi-ia32-cdboot-2.02-0.85.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820104" comment="grub2-efi-ia32-modules-2.02-0.85.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820105" comment="grub2-efi-x64-2.02-0.85.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820106" comment="grub2-efi-x64-cdboot-2.02-0.85.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820107" comment="grub2-efi-x64-modules-2.02-0.85.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820108" comment="grub2-pc-2.02-0.85.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820109" comment="grub2-pc-modules-2.02-0.85.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820110" comment="grub2-tools-2.02-0.85.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820111" comment="grub2-tools-extra-2.02-0.85.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820112" comment="grub2-tools-minimal-2.02-0.85.el7_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:8" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<description>
SLES Expanded Support platform 7 update: security update for grub2		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820113" comment="grub2-2.02-0.86.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820114" comment="grub2-common-2.02-0.86.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820115" comment="grub2-efi-ia32-2.02-0.86.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820116" comment="grub2-efi-ia32-cdboot-2.02-0.86.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820117" comment="grub2-efi-ia32-modules-2.02-0.86.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820118" comment="grub2-efi-x64-2.02-0.86.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820119" comment="grub2-efi-x64-cdboot-2.02-0.86.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820120" comment="grub2-efi-x64-modules-2.02-0.86.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820121" comment="grub2-pc-2.02-0.86.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820122" comment="grub2-pc-modules-2.02-0.86.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820123" comment="grub2-tools-2.02-0.86.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820124" comment="grub2-tools-extra-2.02-0.86.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820125" comment="grub2-tools-minimal-2.02-0.86.el7_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:9" version="1" class="patch">
	<metadata>
		<title>security update for shim-signed (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<description>
SLES Expanded Support platform 7 update: security update for shim-signed		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820126" comment="mokutil-15.4-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820127" comment="shim-ia32-15.4-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820128" comment="shim-x64-15.4-4.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820126" comment="mokutil-15.4-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820127" comment="shim-ia32-15.4-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820128" comment="shim-x64-15.4-4.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:10" version="1" class="patch">
	<metadata>
		<title>security update for fwupdate (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<description>
SLES Expanded Support platform 7 update: security update for fwupdate		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820129" comment="fwupdate-12-6.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820130" comment="fwupdate-devel-12-6.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820131" comment="fwupdate-efi-12-6.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820132" comment="fwupdate-libs-12-6.el7_8 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820129" comment="fwupdate-12-6.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820130" comment="fwupdate-devel-12-6.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820131" comment="fwupdate-efi-12-6.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820132" comment="fwupdate-libs-12-6.el7_8 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:11" version="1" class="patch">
	<metadata>
		<title>security update for  (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<description>
SLES Expanded Support platform 7 update: security update for 		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820133" comment="log4j-1.2.17-17.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820134" comment="log4j-javadoc-1.2.17-17.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820135" comment="log4j-manual-1.2.17-17.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:12" version="1" class="patch">
	<metadata>
		<title>security update for RHSA-2022:0442 for RES7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<description>
SLES Expanded Support platform 7 update: 0442 for RES7		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820136" comment="log4j-1.2.17-18.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820137" comment="log4j-javadoc-1.2.17-18.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820138" comment="log4j-manual-1.2.17-18.el7_4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820136" comment="log4j-1.2.17-18.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820137" comment="log4j-javadoc-1.2.17-18.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820138" comment="log4j-manual-1.2.17-18.el7_4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:13" version="1" class="patch">
	<metadata>
		<title>security update for runc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="1240234" ref_url="https://bugzilla.suse.com/1240234" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626/" source="CVE"/>
		<description>
The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime. Security Fix(es): runc: file descriptor leak (CVE-2024-21626).		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1240234">SUSE bug 1240234</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976232" comment="runc-1.0.0-70.rc10.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:14" version="1" class="patch">
	<metadata>
		<title>security update for docker (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="1240234" ref_url="https://bugzilla.suse.com/1240234" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626/" source="CVE"/>
		<description>
Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that runs virtually anywhere. Security Fix(es): runc: file descriptor leak (CVE-2024-21626) 
  		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1240234">SUSE bug 1240234</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976233" comment="docker-1.13.1-210.git7d71120.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976234" comment="docker-client-1.13.1-210.git7d71120.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976235" comment="docker-common-1.13.1-210.git7d71120.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976236" comment="docker-logrotate-1.13.1-210.git7d71120.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976237" comment="docker-lvm-plugin-1.13.1-210.git7d71120.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976238" comment="docker-novolume-plugin-1.13.1-210.git7d71120.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976239" comment="docker-v1.10-migrator-1.13.1-210.git7d71120.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:15" version="1" class="patch">
	<metadata>
		<title>kernel: CVE-2022-1011, CVE-2024-36971 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2024-36971" ref_url="https://www.suse.com/security/cve/CVE-2024-36971/" source="CVE"/>
		<description>
kernel: CVE-2022-1011, CVE-2024-36971		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1011">CVE-2022-1011 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36971/">CVE-2024-36971 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36971">CVE-2024-36971 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943012" comment="bpftool-3.10.0-1160.123.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943013" comment="kernel-3.10.0-1160.123.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943014" comment="kernel-abi-whitelists-3.10.0-1160.123.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943015" comment="kernel-debug-3.10.0-1160.123.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943018" comment="kernel-doc-3.10.0-1160.123.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943019" comment="kernel-headers-3.10.0-1160.123.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943020" comment="kernel-tools-3.10.0-1160.123.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943021" comment="kernel-tools-libs-3.10.0-1160.123.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943023" comment="perf-3.10.0-1160.123.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943024" comment="python-perf-3.10.0-1160.123.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:16" version="1" class="patch">
	<metadata>
		<title>httpd: security fixes equal to RHSA-2024:4943 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-38474" ref_url="https://www.suse.com/security/cve/CVE-2024-38474/" source="CVE"/>
		<reference ref_id="CVE-2024-38475" ref_url="https://www.suse.com/security/cve/CVE-2024-38475/" source="CVE"/>
		<reference ref_id="CVE-2024-38477" ref_url="https://www.suse.com/security/cve/CVE-2024-38477/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4943. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2024:4943		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38474/">CVE-2024-38474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38474">CVE-2024-38474 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38475/">CVE-2024-38475 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38475">CVE-2024-38475 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38477/">CVE-2024-38477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38477">CVE-2024-38477 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942736" comment="httpd-2.4.6-99.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942737" comment="httpd-devel-2.4.6-99.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942738" comment="httpd-manual-2.4.6-99.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942739" comment="httpd-tools-2.4.6-99.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942740" comment="mod_ldap-2.4.6-99.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942741" comment="mod_proxy_html-2.4.6-99.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942742" comment="mod_session-2.4.6-99.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942743" comment="mod_ssl-2.4.6-99.el7_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:17" version="1" class="patch">
	<metadata>
		<title> Important: linux-firmware security update for 7.0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-31315" ref_url="https://www.suse.com/security/cve/CVE-2023-31315/" source="CVE"/>
		<description>
 Important: linux-firmware security update for 7.0		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31315/">CVE-2023-31315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-31315">CVE-2023-31315 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944402" comment="iwl100-firmware-39.31.5.1-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944403" comment="iwl1000-firmware-39.31.5.1-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944404" comment="iwl105-firmware-18.168.6.1-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944405" comment="iwl135-firmware-18.168.6.1-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944406" comment="iwl2000-firmware-18.168.6.1-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944407" comment="iwl2030-firmware-18.168.6.1-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944408" comment="iwl3160-firmware-22.0.7.0-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944409" comment="iwl3945-firmware-15.32.2.9-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944410" comment="iwl4965-firmware-228.61.2.24-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944411" comment="iwl5000-firmware-8.83.5.1_1-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944412" comment="iwl5150-firmware-8.24.2.2-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944413" comment="iwl6000-firmware-9.221.4.1-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944414" comment="iwl6000g2a-firmware-17.168.5.3-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944415" comment="iwl6000g2b-firmware-17.168.5.2-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944416" comment="iwl6050-firmware-41.28.5.1-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944417" comment="iwl7260-firmware-22.0.7.0-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944933" comment="iwlax2xx-firmware-20240715-999.34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947247" comment="linux-firmware-20240715-999.34.git4c8fb21e.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:18" version="1" class="patch">
	<metadata>
		<title>security update for httpd from RHSA-2024:7101 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-38476" ref_url="https://www.suse.com/security/cve/CVE-2024-38476/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7101. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2024:7101		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-38476/">CVE-2024-38476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38476">CVE-2024-38476 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947472" comment="httpd-2.4.6-99.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947473" comment="httpd-devel-2.4.6-99.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947474" comment="httpd-manual-2.4.6-99.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947475" comment="httpd-tools-2.4.6-99.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947476" comment="mod_ldap-2.4.6-99.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947477" comment="mod_proxy_html-2.4.6-99.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947478" comment="mod_session-2.4.6-99.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947479" comment="mod_ssl-2.4.6-99.el7_9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:19" version="1" class="patch">
	<metadata>
		<title>security update for freeradius (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-3596" ref_url="https://www.suse.com/security/cve/CVE-2024-3596/" source="CVE"/>
		<description>
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-3596/">CVE-2024-3596 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3596">CVE-2024-3596 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950973" comment="freeradius-3.0.13-15.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950974" comment="freeradius-devel-3.0.13-15.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950975" comment="freeradius-doc-3.0.13-15.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950976" comment="freeradius-krb5-3.0.13-15.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950977" comment="freeradius-ldap-3.0.13-15.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950978" comment="freeradius-mysql-3.0.13-15.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950979" comment="freeradius-perl-3.0.13-15.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950980" comment="freeradius-postgresql-3.0.13-15.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950981" comment="freeradius-python-3.0.13-15.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950982" comment="freeradius-sqlite-3.0.13-15.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950983" comment="freeradius-unixODBC-3.0.13-15.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950984" comment="freeradius-utils-3.0.13-15.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<description>
[20241003-999.35.git95bfe086.el7]- Rebase to latest upstream		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959681" comment="iwl100-firmware-39.31.5.1-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959682" comment="iwl1000-firmware-39.31.5.1-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959683" comment="iwl105-firmware-18.168.6.1-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959684" comment="iwl135-firmware-18.168.6.1-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959685" comment="iwl2000-firmware-18.168.6.1-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959686" comment="iwl2030-firmware-18.168.6.1-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959687" comment="iwl3160-firmware-22.0.7.0-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959688" comment="iwl3945-firmware-15.32.2.9-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959689" comment="iwl4965-firmware-228.61.2.24-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959690" comment="iwl5000-firmware-8.83.5.1_1-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959691" comment="iwl5150-firmware-8.24.2.2-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959692" comment="iwl6000-firmware-9.221.4.1-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959693" comment="iwl6000g2a-firmware-17.168.5.3-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959694" comment="iwl6000g2b-firmware-17.168.5.2-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959695" comment="iwl6050-firmware-41.28.5.1-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959696" comment="iwl7260-firmware-22.0.7.0-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959697" comment="iwlax2xx-firmware-20241110-999.36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959698" comment="linux-firmware-20241110-999.36.git95bfe086.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959699" comment="linux-nano-firmware-20241110-999.36.git95bfe086.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:21" version="1" class="patch">
	<metadata>
		<title>security update for shim-signed from RHSA-2024:1959 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-40546" ref_url="https://www.suse.com/security/cve/CVE-2023-40546/" source="CVE"/>
		<reference ref_id="CVE-2023-40547" ref_url="https://www.suse.com/security/cve/CVE-2023-40547/" source="CVE"/>
		<reference ref_id="CVE-2023-40548" ref_url="https://www.suse.com/security/cve/CVE-2023-40548/" source="CVE"/>
		<reference ref_id="CVE-2023-40549" ref_url="https://www.suse.com/security/cve/CVE-2023-40549/" source="CVE"/>
		<reference ref_id="CVE-2023-40550" ref_url="https://www.suse.com/security/cve/CVE-2023-40550/" source="CVE"/>
		<reference ref_id="CVE-2023-40551" ref_url="https://www.suse.com/security/cve/CVE-2023-40551/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1959. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2024:1959		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40546/">CVE-2023-40546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40546">CVE-2023-40546 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40547/">CVE-2023-40547 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40547">CVE-2023-40547 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40548/">CVE-2023-40548 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40548">CVE-2023-40548 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40549/">CVE-2023-40549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40549">CVE-2023-40549 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40550/">CVE-2023-40550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40550">CVE-2023-40550 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40551/">CVE-2023-40551 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40551">CVE-2023-40551 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960781" comment="mokutil-15.8-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960782" comment="shim-ia32-15.8-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960783" comment="shim-x64-15.8-2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:22" version="1" class="patch">
	<metadata>
		<title>Moderate: doxygen security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="1850004" ref_url="https://bugzilla.suse.com/1850004" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
Doxygen can generate an online class browser (in HTML) and/or a reference manual (in LaTeX) from a set of documented source files		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1850004">SUSE bug 1850004</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965282" comment="doxygen-1.8.5-4.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965283" comment="doxygen-doxywizard-1.8.5-4.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965284" comment="doxygen-latex-1.8.5-4.el7_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:23" version="1" class="patch">
	<metadata>
		<title>security update for freetype (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-27363" ref_url="https://www.suse.com/security/cve/CVE-2025-27363/" source="CVE"/>
		<description>
SUSE Liberty Linux 7 update:  CVE-2025-27363 fix		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27363/">CVE-2025-27363 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27363">CVE-2025-27363 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009975550" comment="freetype-2.8-15.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975551" comment="freetype-demos-2.8-15.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009975552" comment="freetype-devel-2.8-15.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:24" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-45781" ref_url="https://www.suse.com/security/cve/CVE-2024-45781/" source="CVE"/>
		<reference ref_id="CVE-2024-45782" ref_url="https://www.suse.com/security/cve/CVE-2024-45782/" source="CVE"/>
		<reference ref_id="CVE-2024-56737" ref_url="https://www.suse.com/security/cve/CVE-2024-56737/" source="CVE"/>
		<reference ref_id="CVE-2025-0624" ref_url="https://www.suse.com/security/cve/CVE-2025-0624/" source="CVE"/>
		<description>
Security update for grub2: CVE-2025-0624, CVE-2024-45781, CVE-2024-45782, CVE-2024-56737 fixes		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45781/">CVE-2024-45781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45781">CVE-2024-45781 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45782/">CVE-2024-45782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45782">CVE-2024-45782 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56737/">CVE-2024-56737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56737">CVE-2024-56737 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0624/">CVE-2025-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0624">CVE-2025-0624 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974746" comment="grub2-2.02-0.87.0.4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974747" comment="grub2-common-2.02-0.87.0.4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974748" comment="grub2-efi-ia32-2.02-0.87.0.4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974749" comment="grub2-efi-ia32-cdboot-2.02-0.87.0.4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974750" comment="grub2-efi-ia32-modules-2.02-0.87.0.4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974751" comment="grub2-efi-x64-2.02-0.87.0.4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974752" comment="grub2-efi-x64-cdboot-2.02-0.87.0.4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974753" comment="grub2-efi-x64-modules-2.02-0.87.0.4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974754" comment="grub2-pc-2.02-0.87.0.4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974755" comment="grub2-pc-modules-2.02-0.87.0.4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974756" comment="grub2-tools-2.02-0.87.0.4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974757" comment="grub2-tools-extra-2.02-0.87.0.4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974758" comment="grub2-tools-minimal-2.02-0.87.0.4.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:25" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<description>
CVE-2020-14145, CVE-2019-6109, CVE-2019-6110, CVE-2019-6111, CVE-2018-20685 for openssh		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20685">CVE-2018-20685 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6109">CVE-2019-6109 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6110">CVE-2019-6110 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14145">CVE-2020-14145 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976140" comment="openssh-7.4p1-23.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976141" comment="openssh-askpass-7.4p1-23.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976142" comment="openssh-cavs-7.4p1-23.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976143" comment="openssh-clients-7.4p1-23.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976144" comment="openssh-keycat-7.4p1-23.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976145" comment="openssh-ldap-7.4p1-23.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976146" comment="openssh-server-7.4p1-23.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976147" comment="openssh-server-sysvinit-7.4p1-23.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976148" comment="pam_ssh_agent_auth-0.10.3-2.23.el7_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:26" version="1" class="patch">
	<metadata>
		<title>Important: libxslt security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-55549" ref_url="https://www.suse.com/security/cve/CVE-2024-55549/" source="CVE"/>
		<description>
Extra patch in CVE-2024-55549 for memory leak		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-55549/">CVE-2024-55549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55549">CVE-2024-55549 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009982178" comment="libxslt-1.1.28-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982179" comment="libxslt-devel-1.1.28-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009982180" comment="libxslt-python-1.1.28-9.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:27" version="1" class="patch">
	<metadata>
		<title>Moderate: doxygen security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
Doxygen can generate an online class browser (in HTML) and/or a reference manual (in LaTeX) from a set of documented source files. The documentation is extracted directly from the sources. Doxygen can also be configured to extract the code structure from undocumented source files. Security Fix(es): jquery: Untrusted code execution via &lt;option&gt; tag in HTML passed to DOM manipulation methods (CVE-2020-11023) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965282" comment="doxygen-1.8.5-4.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965283" comment="doxygen-doxywizard-1.8.5-4.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965284" comment="doxygen-latex-1.8.5-4.el7_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:28" version="1" class="patch">
	<metadata>
		<title>upgrade to upstream linux-firmware-20251030 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-62626" ref_url="https://www.suse.com/security/cve/CVE-2025-62626/" source="CVE"/>
		<description>
[20251030-999.44.1.gite9292517.el7]- Include AMD ucode fix (CVE-2025-62626)		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-62626/">CVE-2025-62626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62626">CVE-2025-62626 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010030661" comment="iwl100-firmware-39.31.5.1-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030662" comment="iwl1000-firmware-39.31.5.1-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030663" comment="iwl105-firmware-18.168.6.1-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030664" comment="iwl135-firmware-18.168.6.1-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030665" comment="iwl2000-firmware-18.168.6.1-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030666" comment="iwl2030-firmware-18.168.6.1-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030667" comment="iwl3160-firmware-22.0.7.0-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030668" comment="iwl3945-firmware-15.32.2.9-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030669" comment="iwl4965-firmware-228.61.2.24-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030670" comment="iwl5000-firmware-8.83.5.1_1-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030671" comment="iwl5150-firmware-8.24.2.2-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030672" comment="iwl6000-firmware-9.221.4.1-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030673" comment="iwl6000g2a-firmware-17.168.5.3-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030674" comment="iwl6000g2b-firmware-17.168.5.2-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030675" comment="iwl6050-firmware-41.28.5.1-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030676" comment="iwl7260-firmware-22.0.7.0-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030677" comment="iwlax2xx-firmware-20251030-999.44.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010030678" comment="linux-firmware-20251030-999.44.1.gite9292517.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:29" version="1" class="patch">
	<metadata>
		<title>Important: httpd security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-58098" ref_url="https://www.suse.com/security/cve/CVE-2025-58098/" source="CVE"/>
		<description>
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58098/">CVE-2025-58098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58098">CVE-2025-58098 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039781" comment="httpd-2.4.6-99.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039782" comment="httpd-devel-2.4.6-99.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039783" comment="httpd-manual-2.4.6-99.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039784" comment="httpd-tools-2.4.6-99.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039785" comment="mod_ldap-2.4.6-99.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039786" comment="mod_proxy_html-2.4.6-99.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039787" comment="mod_session-2.4.6-99.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039788" comment="mod_ssl-2.4.6-99.el7_9.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:30" version="1" class="patch">
	<metadata>
		<title>Moderate: python security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<description>
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing.
  		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010040947" comment="python-2.7.5-94.el7_9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040948" comment="python-debug-2.7.5-94.el7_9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040949" comment="python-devel-2.7.5-94.el7_9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040950" comment="python-libs-2.7.5-94.el7_9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040951" comment="python-test-2.7.5-94.el7_9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040952" comment="python-tools-2.7.5-94.el7_9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040953" comment="tkinter-2.7.5-94.el7_9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:31" version="1" class="patch">
	<metadata>
		<title>kernel security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640/" source="CVE"/>
		<reference ref_id="CVE-2022-50341" ref_url="https://www.suse.com/security/cve/CVE-2022-50341/" source="CVE"/>
		<reference ref_id="CVE-2022-50386" ref_url="https://www.suse.com/security/cve/CVE-2022-50386/" source="CVE"/>
		<reference ref_id="CVE-2022-50408" ref_url="https://www.suse.com/security/cve/CVE-2022-50408/" source="CVE"/>
		<reference ref_id="CVE-2023-53305" ref_url="https://www.suse.com/security/cve/CVE-2023-53305/" source="CVE"/>
		<reference ref_id="CVE-2023-53365" ref_url="https://www.suse.com/security/cve/CVE-2023-53365/" source="CVE"/>
		<reference ref_id="CVE-2025-38718" ref_url="https://www.suse.com/security/cve/CVE-2025-38718/" source="CVE"/>
		<description>
[3.10.0-1160.119.1.0.15]- Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del() {CVE-2022-3640} [Orabug: 38742878]- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put [Orabug: 38742878]- Bluetooth: L2CAP: Fix user-after-free {CVE-2022-50386} [Orabug: 38742878]- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408} [Orabug: 38742878]- Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305} [Orabug: 38742878]- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365} [Orabug: 38742878]- sctp: linearize cloned gso packets in sctp_rcv {CVE-2025-38718} [Orabug: 38742878][3.10.0-1160.119.1.0.14]- HID: core: fix shift-out-of-bounds in hid_report_raw_event {CVE-2022-48978} [Orabug: 38644370]- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373} [Orabug: 38644370]- nfsd: don't ignore the return code of svc_proc_register() {CVE-2025-22026} [Orabug: 38644370]- net_sched: hfsc: Fix a UAF vulnerability in class handling {CVE-2025-37797} [Orabug: 38644370]- HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556} [Orabug: 38644370]- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751} [Orabug: 38644370][3.10.0-1160.119.1.0.13]- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() {CVE-2022-48701} [Orabug: 38493400]- md-raid10: fix KASAN warning {CVE-2022-50211} [Orabug: 38493400]- ALSA: bcd2000: Fix a UAF bug on the error path of probing {CVE-2022-50229} [Orabug: 38493400]- net: usb: smsc75xx: Limit packet length to skb-&gt;len {CVE-2023-53125} [Orabug: 38493400]- i40e: fix MMIO write access to an invalid page in i40e_clear_hw {CVE-2025-38200} [Orabug: 38493400]- net/sched: sch_qfq: Fix race condition on qfq_aggregate {CVE-2025-38477} [Orabug: 38493400][3.10.0-1160.119.1.0.12]- scsi: lpfc: Use memcpy() for BIOS version (CVE-2025-38332) [Orabug: 38414589]- posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) [Orabug: 38414589][3.10.0-1160.119.1.0.11]- kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)- kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)- kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)- kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CVE-2022-49788)- kernel: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (CVE-2025-38000)- kernel: ext4: avoid resizing to a partial cluster size (CVE-2022-50020)- kernel: drivers:md:fix a potential use-after-free bug (CVE-2022-50022)- kernel: sch_hfsc: make hfsc_qlen_notify() idempotent (CVE-2025-38177)- kernel: net/sched: Always pass notifications when child class becomes empty (CVE-2025-38350)- crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)[3.10.0-1160.119.1.0.10]- net: atlantic: fix aq_vec index out of range error (Chia-Lin Kao) {CVE-2022-50066} [Orabug: 38201271]- net: atm: fix use after free in lec_send() (Dan Carpenter) {CVE-2025-22004} [Orabug: 38201271][3.10.0-1160.119.1.0.9]- netfilter: ipset: add missing range check in bitmap_ip_uadt (Jeongjun Park) {CVE-2024-53141} [Orabug: 37964173]- Update OL SB certificates- Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985797][3.10.0-1160.119.1.0.8]- ALSA: usb-audio: Fix out of bounds reads when finding clock sources (Takashi Iwai) {CVE-2024-53150} [Orabug: 37830084][3.10.0-1160.119.1.0.7]- ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (Benoit Sevens) {CVE-2024-53197} [Orabug: 37686305]- can: bcm: Fix UAF in bcm_proc_show() (YueHaibing) {CVE-2023-52922} [Orabug: 37686305]- HID: core: zero-initialize the report buffer (Benoit Sevens) {CVE-2024-50302} [Orabug: 37686305][3.10.0-1160.119.1.0.6]- media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (Benoit Sevens) {CVE-2024-53104} [Orabug: 37584712]		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3640">CVE-2022-3640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50341/">CVE-2022-50341 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50341">CVE-2022-50341 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50386/">CVE-2022-50386 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50386">CVE-2022-50386 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50408/">CVE-2022-50408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50408">CVE-2022-50408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53305/">CVE-2023-53305 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53305">CVE-2023-53305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53365/">CVE-2023-53365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53365">CVE-2023-53365 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38718/">CVE-2025-38718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38718">CVE-2025-38718 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041680" comment="bpftool-3.10.0-1160.125.1.0.15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041681" comment="kernel-3.10.0-1160.125.1.0.15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041682" comment="kernel-abi-whitelists-3.10.0-1160.125.1.0.15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041683" comment="kernel-debug-3.10.0-1160.125.1.0.15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041686" comment="kernel-doc-3.10.0-1160.125.1.0.15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041687" comment="kernel-headers-3.10.0-1160.125.1.0.15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041688" comment="kernel-tools-3.10.0-1160.125.1.0.15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041689" comment="kernel-tools-libs-3.10.0-1160.125.1.0.15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041691" comment="perf-3.10.0-1160.125.1.0.15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041692" comment="python-perf-3.10.0-1160.125.1.0.15.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:32" version="1" class="patch">
	<metadata>
		<title>grub2: CVE-2025-61662 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-61662" ref_url="https://www.suse.com/security/cve/CVE-2025-61662/" source="CVE"/>
		<description>
grub2: CVE-2025-61662		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61662/">CVE-2025-61662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61662">CVE-2025-61662 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050055" comment="grub2-2.02-0.87.0.5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050056" comment="grub2-common-2.02-0.87.0.5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050057" comment="grub2-efi-ia32-2.02-0.87.0.5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050058" comment="grub2-efi-ia32-cdboot-2.02-0.87.0.5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050059" comment="grub2-efi-ia32-modules-2.02-0.87.0.5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050060" comment="grub2-efi-x64-2.02-0.87.0.5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050061" comment="grub2-efi-x64-cdboot-2.02-0.87.0.5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050062" comment="grub2-efi-x64-modules-2.02-0.87.0.5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050063" comment="grub2-pc-2.02-0.87.0.5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050064" comment="grub2-pc-modules-2.02-0.87.0.5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050065" comment="grub2-tools-2.02-0.87.0.5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050066" comment="grub2-tools-extra-2.02-0.87.0.5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050067" comment="grub2-tools-minimal-2.02-0.87.0.5.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:33" version="1" class="patch">
	<metadata>
		<title>Moderate: python security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366/" source="CVE"/>
		<reference ref_id="CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367/" source="CVE"/>
		<description>
Security Fix(es): cpython: IMAP command injection in user-controlled commands (CVE-2025-15366) 
 cpython: POP3 command injection in user-controlled commands (CVE-2025-15367) 
  		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010051492" comment="python-2.7.5-94.el7_9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051493" comment="python-debug-2.7.5-94.el7_9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051494" comment="python-devel-2.7.5-94.el7_9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051495" comment="python-libs-2.7.5-94.el7_9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051496" comment="python-test-2.7.5-94.el7_9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051497" comment="python-tools-2.7.5-94.el7_9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010051498" comment="tkinter-2.7.5-94.el7_9.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:34" version="1" class="patch">
	<metadata>
		<title>enhancement update for microcode_ctl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-34440" ref_url="https://www.suse.com/security/cve/CVE-2023-34440/" source="CVE"/>
		<reference ref_id="CVE-2023-43758" ref_url="https://www.suse.com/security/cve/CVE-2023-43758/" source="CVE"/>
		<reference ref_id="CVE-2024-24582" ref_url="https://www.suse.com/security/cve/CVE-2024-24582/" source="CVE"/>
		<reference ref_id="CVE-2024-28127" ref_url="https://www.suse.com/security/cve/CVE-2024-28127/" source="CVE"/>
		<reference ref_id="CVE-2024-29214" ref_url="https://www.suse.com/security/cve/CVE-2024-29214/" source="CVE"/>
		<description>
This enhancement update provides a functional equivalent of RHEA-2025:2427.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHEA-2025:2427.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34440/">CVE-2023-34440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-34440">CVE-2023-34440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-43758/">CVE-2023-43758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43758">CVE-2023-43758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24582/">CVE-2024-24582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24582">CVE-2024-24582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28127/">CVE-2024-28127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28127">CVE-2024-28127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-29214/">CVE-2024-29214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29214">CVE-2024-29214 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010040954" comment="microcode_ctl-2.1-73.23.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429/" source="CVE"/>
		<reference ref_id="CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446/" source="CVE"/>
		<reference ref_id="CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451/" source="CVE"/>
		<reference ref_id="CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452/" source="CVE"/>
		<reference ref_id="CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453/" source="CVE"/>
		<reference ref_id="CVE-2014-0454" ref_url="https://www.suse.com/security/cve/CVE-2014-0454/" source="CVE"/>
		<reference ref_id="CVE-2014-0455" ref_url="https://www.suse.com/security/cve/CVE-2014-0455/" source="CVE"/>
		<reference ref_id="CVE-2014-0456" ref_url="https://www.suse.com/security/cve/CVE-2014-0456/" source="CVE"/>
		<reference ref_id="CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457/" source="CVE"/>
		<reference ref_id="CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458/" source="CVE"/>
		<reference ref_id="CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459/" source="CVE"/>
		<reference ref_id="CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460/" source="CVE"/>
		<reference ref_id="CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461/" source="CVE"/>
		<reference ref_id="CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876/" source="CVE"/>
		<reference ref_id="CVE-2014-2397" ref_url="https://www.suse.com/security/cve/CVE-2014-2397/" source="CVE"/>
		<reference ref_id="CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398/" source="CVE"/>
		<reference ref_id="CVE-2014-2402" ref_url="https://www.suse.com/security/cve/CVE-2014-2402/" source="CVE"/>
		<reference ref_id="CVE-2014-2403" ref_url="https://www.suse.com/security/cve/CVE-2014-2403/" source="CVE"/>
		<reference ref_id="CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412/" source="CVE"/>
		<reference ref_id="CVE-2014-2413" ref_url="https://www.suse.com/security/cve/CVE-2014-2413/" source="CVE"/>
		<reference ref_id="CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414/" source="CVE"/>
		<reference ref_id="CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421/" source="CVE"/>
		<reference ref_id="CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423/" source="CVE"/>
		<reference ref_id="CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0675.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0675.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0429">CVE-2014-0429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0446">CVE-2014-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0451">CVE-2014-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0452">CVE-2014-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0453">CVE-2014-0453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0454/">CVE-2014-0454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0454">CVE-2014-0454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0455/">CVE-2014-0455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0455">CVE-2014-0455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0456/">CVE-2014-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0456">CVE-2014-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0457">CVE-2014-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0458">CVE-2014-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0459">CVE-2014-0459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0460">CVE-2014-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0461">CVE-2014-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1876">CVE-2014-1876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2397/">CVE-2014-2397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2397">CVE-2014-2397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2398">CVE-2014-2398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2402/">CVE-2014-2402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2402">CVE-2014-2402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2403/">CVE-2014-2403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2403">CVE-2014-2403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2412">CVE-2014-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2413/">CVE-2014-2413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2413">CVE-2014-2413 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2414">CVE-2014-2414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2421">CVE-2014-2421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2423">CVE-2014-2423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2427">CVE-2014-2427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820139" comment="java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820140" comment="java-1.7.0-openjdk-accessibility-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820141" comment="java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820142" comment="java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820143" comment="java-1.7.0-openjdk-headless-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820144" comment="java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820145" comment="java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0678.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0678.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0196">CVE-2014-0196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820146" comment="kernel-3.10.0-123.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820147" comment="kernel-abi-whitelists-3.10.0-123.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820148" comment="kernel-debug-3.10.0-123.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820151" comment="kernel-doc-3.10.0-123.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820152" comment="kernel-headers-3.10.0-123.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820153" comment="kernel-tools-3.10.0-123.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820154" comment="kernel-tools-libs-3.10.0-123.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820156" comment="perf-3.10.0-123.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820157" comment="python-perf-3.10.0-123.1.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298/" source="CVE"/>
		<reference ref_id="CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195/" source="CVE"/>
		<reference ref_id="CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198/" source="CVE"/>
		<reference ref_id="CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221/" source="CVE"/>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<reference ref_id="CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0679.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0679.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5298">CVE-2010-5298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0195">CVE-2014-0195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0198">CVE-2014-0198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0221">CVE-2014-0221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3470">CVE-2014-3470 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820158" comment="openssl-1.0.1e-34.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820159" comment="openssl-devel-1.0.1e-34.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820160" comment="openssl-libs-1.0.1e-34.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820161" comment="openssl-perl-1.0.1e-34.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820162" comment="openssl-static-1.0.1e-34.el7_0.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38" version="1" class="patch">
	<metadata>
		<title>security update for openssl098e (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0680.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0680.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0224">CVE-2014-0224 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820163" comment="openssl098e-0.9.8e-29.el7_0.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3465" ref_url="https://www.suse.com/security/cve/CVE-2014-3465/" source="CVE"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0684.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0684.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3465/">CVE-2014-3465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3465">CVE-2014-3465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3466">CVE-2014-3466 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820164" comment="gnutls-3.1.18-9.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820165" comment="gnutls-c++-3.1.18-9.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820166" comment="gnutls-dane-3.1.18-9.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820167" comment="gnutls-devel-3.1.18-9.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820168" comment="gnutls-utils-3.1.18-9.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40" version="1" class="patch">
	<metadata>
		<title>security update for java-1.6.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429/" source="CVE"/>
		<reference ref_id="CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446/" source="CVE"/>
		<reference ref_id="CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451/" source="CVE"/>
		<reference ref_id="CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452/" source="CVE"/>
		<reference ref_id="CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453/" source="CVE"/>
		<reference ref_id="CVE-2014-0456" ref_url="https://www.suse.com/security/cve/CVE-2014-0456/" source="CVE"/>
		<reference ref_id="CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457/" source="CVE"/>
		<reference ref_id="CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458/" source="CVE"/>
		<reference ref_id="CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460/" source="CVE"/>
		<reference ref_id="CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461/" source="CVE"/>
		<reference ref_id="CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876/" source="CVE"/>
		<reference ref_id="CVE-2014-2397" ref_url="https://www.suse.com/security/cve/CVE-2014-2397/" source="CVE"/>
		<reference ref_id="CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398/" source="CVE"/>
		<reference ref_id="CVE-2014-2403" ref_url="https://www.suse.com/security/cve/CVE-2014-2403/" source="CVE"/>
		<reference ref_id="CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412/" source="CVE"/>
		<reference ref_id="CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414/" source="CVE"/>
		<reference ref_id="CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421/" source="CVE"/>
		<reference ref_id="CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423/" source="CVE"/>
		<reference ref_id="CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0685.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0685.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0429">CVE-2014-0429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0446">CVE-2014-0446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0451">CVE-2014-0451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0452">CVE-2014-0452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0453">CVE-2014-0453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0456/">CVE-2014-0456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0456">CVE-2014-0456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0457">CVE-2014-0457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0458">CVE-2014-0458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0460">CVE-2014-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0461">CVE-2014-0461 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1876">CVE-2014-1876 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2397/">CVE-2014-2397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2397">CVE-2014-2397 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2398">CVE-2014-2398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2403/">CVE-2014-2403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2403">CVE-2014-2403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2412">CVE-2014-2412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2414">CVE-2014-2414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2421">CVE-2014-2421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2423">CVE-2014-2423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2427">CVE-2014-2427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820169" comment="java-1.6.0-openjdk-1.6.0.0-6.1.13.3.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820170" comment="java-1.6.0-openjdk-demo-1.6.0.0-6.1.13.3.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820171" comment="java-1.6.0-openjdk-devel-1.6.0.0-6.1.13.3.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820172" comment="java-1.6.0-openjdk-javadoc-1.6.0.0-6.1.13.3.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820173" comment="java-1.6.0-openjdk-src-1.6.0.0-6.1.13.3.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2013-4286" ref_url="https://www.suse.com/security/cve/CVE-2013-4286/" source="CVE"/>
		<reference ref_id="CVE-2013-4322" ref_url="https://www.suse.com/security/cve/CVE-2013-4322/" source="CVE"/>
		<reference ref_id="CVE-2014-0186" ref_url="https://www.suse.com/security/cve/CVE-2014-0186/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0686.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0686.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4286/">CVE-2013-4286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4286">CVE-2013-4286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4322/">CVE-2013-4322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4322">CVE-2013-4322 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0186/">CVE-2014-0186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0186">CVE-2014-0186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820174" comment="tomcat-7.0.42-5.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820175" comment="tomcat-admin-webapps-7.0.42-5.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820176" comment="tomcat-docs-webapp-7.0.42-5.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820177" comment="tomcat-el-2.2-api-7.0.42-5.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820178" comment="tomcat-javadoc-7.0.42-5.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820179" comment="tomcat-jsp-2.2-api-7.0.42-5.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820180" comment="tomcat-jsvc-7.0.42-5.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820181" comment="tomcat-lib-7.0.42-5.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820182" comment="tomcat-servlet-3.0-api-7.0.42-5.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820183" comment="tomcat-webapps-7.0.42-5.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42" version="1" class="patch">
	<metadata>
		<title>security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0687.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0687.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3467">CVE-2014-3467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3468">CVE-2014-3468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3469">CVE-2014-3469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820184" comment="libtasn1-3.3-5.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820185" comment="libtasn1-devel-3.3-5.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820186" comment="libtasn1-tools-3.3-5.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:43" version="1" class="patch">
	<metadata>
		<title>security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0384" ref_url="https://www.suse.com/security/cve/CVE-2014-0384/" source="CVE"/>
		<reference ref_id="CVE-2014-2419" ref_url="https://www.suse.com/security/cve/CVE-2014-2419/" source="CVE"/>
		<reference ref_id="CVE-2014-2430" ref_url="https://www.suse.com/security/cve/CVE-2014-2430/" source="CVE"/>
		<reference ref_id="CVE-2014-2431" ref_url="https://www.suse.com/security/cve/CVE-2014-2431/" source="CVE"/>
		<reference ref_id="CVE-2014-2432" ref_url="https://www.suse.com/security/cve/CVE-2014-2432/" source="CVE"/>
		<reference ref_id="CVE-2014-2436" ref_url="https://www.suse.com/security/cve/CVE-2014-2436/" source="CVE"/>
		<reference ref_id="CVE-2014-2438" ref_url="https://www.suse.com/security/cve/CVE-2014-2438/" source="CVE"/>
		<reference ref_id="CVE-2014-2440" ref_url="https://www.suse.com/security/cve/CVE-2014-2440/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0702.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0702.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0384/">CVE-2014-0384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0384">CVE-2014-0384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2419/">CVE-2014-2419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2419">CVE-2014-2419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2430/">CVE-2014-2430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2430">CVE-2014-2430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2431/">CVE-2014-2431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2431">CVE-2014-2431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2432/">CVE-2014-2432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2432">CVE-2014-2432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2436/">CVE-2014-2436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2436">CVE-2014-2436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2438/">CVE-2014-2438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2438">CVE-2014-2438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2440/">CVE-2014-2440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2440">CVE-2014-2440 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820187" comment="mariadb-5.5.37-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820188" comment="mariadb-bench-5.5.37-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820189" comment="mariadb-devel-5.5.37-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820190" comment="mariadb-embedded-5.5.37-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820191" comment="mariadb-embedded-devel-5.5.37-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820192" comment="mariadb-libs-5.5.37-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820193" comment="mariadb-server-5.5.37-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820194" comment="mariadb-test-5.5.37-1.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:44" version="1" class="patch">
	<metadata>
		<title>security update for json-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0703.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0703.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6370">CVE-2013-6370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6371">CVE-2013-6371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820195" comment="json-c-0.11-4.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820196" comment="json-c-devel-0.11-4.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820197" comment="json-c-doc-0.11-4.el7_0 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820195" comment="json-c-0.11-4.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820196" comment="json-c-devel-0.11-4.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820197" comment="json-c-doc-0.11-4.el7_0 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:45" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-2894" ref_url="https://www.suse.com/security/cve/CVE-2014-2894/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0704.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0704.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2894/">CVE-2014-2894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2894">CVE-2014-2894 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820198" comment="libcacard-1.5.3-60.el7_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820199" comment="libcacard-devel-1.5.3-60.el7_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820200" comment="libcacard-tools-1.5.3-60.el7_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820201" comment="qemu-guest-agent-1.5.3-60.el7_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820202" comment="qemu-img-1.5.3-60.el7_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820203" comment="qemu-kvm-1.5.3-60.el7_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820204" comment="qemu-kvm-common-1.5.3-60.el7_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820205" comment="qemu-kvm-tools-1.5.3-60.el7_0.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:46" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0206" ref_url="https://www.suse.com/security/cve/CVE-2014-0206/" source="CVE"/>
		<reference ref_id="CVE-2014-1737" ref_url="https://www.suse.com/security/cve/CVE-2014-1737/" source="CVE"/>
		<reference ref_id="CVE-2014-1738" ref_url="https://www.suse.com/security/cve/CVE-2014-1738/" source="CVE"/>
		<reference ref_id="CVE-2014-2568" ref_url="https://www.suse.com/security/cve/CVE-2014-2568/" source="CVE"/>
		<reference ref_id="CVE-2014-2851" ref_url="https://www.suse.com/security/cve/CVE-2014-2851/" source="CVE"/>
		<reference ref_id="CVE-2014-3144" ref_url="https://www.suse.com/security/cve/CVE-2014-3144/" source="CVE"/>
		<reference ref_id="CVE-2014-3145" ref_url="https://www.suse.com/security/cve/CVE-2014-3145/" source="CVE"/>
		<reference ref_id="CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0786.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0786.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0206/">CVE-2014-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0206">CVE-2014-0206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1737/">CVE-2014-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1737">CVE-2014-1737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1738/">CVE-2014-1738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1738">CVE-2014-1738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2568/">CVE-2014-2568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2568">CVE-2014-2568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2851/">CVE-2014-2851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2851">CVE-2014-2851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3144/">CVE-2014-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3144">CVE-2014-3144 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3145/">CVE-2014-3145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3145">CVE-2014-3145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3153">CVE-2014-3153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820206" comment="kernel-3.10.0-123.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820207" comment="kernel-abi-whitelists-3.10.0-123.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820208" comment="kernel-debug-3.10.0-123.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820211" comment="kernel-doc-3.10.0-123.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820212" comment="kernel-headers-3.10.0-123.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820213" comment="kernel-tools-3.10.0-123.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820214" comment="kernel-tools-libs-3.10.0-123.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820216" comment="perf-3.10.0-123.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820217" comment="python-perf-3.10.0-123.4.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:47" version="1" class="patch">
	<metadata>
		<title>security update for docker (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2014-3499" ref_url="https://www.suse.com/security/cve/CVE-2014-3499/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0820.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0820.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3499/">CVE-2014-3499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3499">CVE-2014-3499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820218" comment="docker-0.11.1-22.el7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820218" comment="docker-0.11.1-22.el7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:48" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0075" ref_url="https://www.suse.com/security/cve/CVE-2014-0075/" source="CVE"/>
		<reference ref_id="CVE-2014-0096" ref_url="https://www.suse.com/security/cve/CVE-2014-0096/" source="CVE"/>
		<reference ref_id="CVE-2014-0099" ref_url="https://www.suse.com/security/cve/CVE-2014-0099/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0827.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0827.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0075/">CVE-2014-0075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0075">CVE-2014-0075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0096/">CVE-2014-0096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0096">CVE-2014-0096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0099/">CVE-2014-0099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0099">CVE-2014-0099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820219" comment="tomcat-7.0.42-6.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820220" comment="tomcat-admin-webapps-7.0.42-6.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820221" comment="tomcat-docs-webapp-7.0.42-6.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820222" comment="tomcat-el-2.2-api-7.0.42-6.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820223" comment="tomcat-javadoc-7.0.42-6.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820224" comment="tomcat-jsp-2.2-api-7.0.42-6.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820225" comment="tomcat-jsvc-7.0.42-6.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820226" comment="tomcat-lib-7.0.42-6.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820227" comment="tomcat-servlet-3.0-api-7.0.42-6.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820228" comment="tomcat-webapps-7.0.42-6.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:49" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178/" source="CVE"/>
		<reference ref_id="CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244/" source="CVE"/>
		<reference ref_id="CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0867.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0867.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0178">CVE-2014-0178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0244">CVE-2014-0244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3493">CVE-2014-3493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820229" comment="libsmbclient-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820230" comment="libsmbclient-devel-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820231" comment="libwbclient-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820232" comment="libwbclient-devel-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820233" comment="samba-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820234" comment="samba-client-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820235" comment="samba-common-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820236" comment="samba-dc-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820237" comment="samba-dc-libs-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820238" comment="samba-devel-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820239" comment="samba-libs-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820240" comment="samba-pidl-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820241" comment="samba-python-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820242" comment="samba-test-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820243" comment="samba-test-devel-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820244" comment="samba-vfs-glusterfs-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820245" comment="samba-winbind-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820246" comment="samba-winbind-clients-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820247" comment="samba-winbind-krb5-locator-4.1.1-35.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820248" comment="samba-winbind-modules-4.1.1-35.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:50" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<reference ref_id="CVE-2014-5177" ref_url="https://www.suse.com/security/cve/CVE-2014-5177/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0914.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0914.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0179">CVE-2014-0179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5177/">CVE-2014-5177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5177">CVE-2014-5177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820249" comment="libvirt-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820250" comment="libvirt-client-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820251" comment="libvirt-daemon-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820252" comment="libvirt-daemon-config-network-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820253" comment="libvirt-daemon-config-nwfilter-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820254" comment="libvirt-daemon-driver-interface-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820255" comment="libvirt-daemon-driver-lxc-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820256" comment="libvirt-daemon-driver-network-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820257" comment="libvirt-daemon-driver-nodedev-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820258" comment="libvirt-daemon-driver-nwfilter-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820259" comment="libvirt-daemon-driver-qemu-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820260" comment="libvirt-daemon-driver-secret-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820261" comment="libvirt-daemon-driver-storage-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820262" comment="libvirt-daemon-kvm-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820263" comment="libvirt-daemon-lxc-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820264" comment="libvirt-devel-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820265" comment="libvirt-docs-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820266" comment="libvirt-lock-sanlock-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820267" comment="libvirt-login-shell-1.1.1-29.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820268" comment="libvirt-python-1.1.1-29.el7_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2013-4352" ref_url="https://www.suse.com/security/cve/CVE-2013-4352/" source="CVE"/>
		<reference ref_id="CVE-2014-0117" ref_url="https://www.suse.com/security/cve/CVE-2014-0117/" source="CVE"/>
		<reference ref_id="CVE-2014-0118" ref_url="https://www.suse.com/security/cve/CVE-2014-0118/" source="CVE"/>
		<reference ref_id="CVE-2014-0226" ref_url="https://www.suse.com/security/cve/CVE-2014-0226/" source="CVE"/>
		<reference ref_id="CVE-2014-0231" ref_url="https://www.suse.com/security/cve/CVE-2014-0231/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0921.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0921.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4352/">CVE-2013-4352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4352">CVE-2013-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0117/">CVE-2014-0117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0117">CVE-2014-0117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0118/">CVE-2014-0118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0118">CVE-2014-0118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0226/">CVE-2014-0226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0226">CVE-2014-0226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0231/">CVE-2014-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0231">CVE-2014-0231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820269" comment="httpd-2.4.6-18.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820270" comment="httpd-devel-2.4.6-18.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820271" comment="httpd-manual-2.4.6-18.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820272" comment="httpd-tools-2.4.6-18.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820273" comment="mod_ldap-2.4.6-18.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820274" comment="mod_proxy_html-2.4.6-18.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820275" comment="mod_session-2.4.6-18.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820276" comment="mod_ssl-2.4.6-18.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-4699" ref_url="https://www.suse.com/security/cve/CVE-2014-4699/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0923.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0923.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4699/">CVE-2014-4699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4699">CVE-2014-4699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4943">CVE-2014-4943 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820277" comment="kernel-3.10.0-123.4.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820278" comment="kernel-abi-whitelists-3.10.0-123.4.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820279" comment="kernel-debug-3.10.0-123.4.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820282" comment="kernel-doc-3.10.0-123.4.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820283" comment="kernel-headers-3.10.0-123.4.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820284" comment="kernel-tools-3.10.0-123.4.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820285" comment="kernel-tools-libs-3.10.0-123.4.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820287" comment="perf-3.10.0-123.4.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820288" comment="python-perf-3.10.0-123.4.4.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2013-4148" ref_url="https://www.suse.com/security/cve/CVE-2013-4148/" source="CVE"/>
		<reference ref_id="CVE-2013-4149" ref_url="https://www.suse.com/security/cve/CVE-2013-4149/" source="CVE"/>
		<reference ref_id="CVE-2013-4150" ref_url="https://www.suse.com/security/cve/CVE-2013-4150/" source="CVE"/>
		<reference ref_id="CVE-2013-4151" ref_url="https://www.suse.com/security/cve/CVE-2013-4151/" source="CVE"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4535" ref_url="https://www.suse.com/security/cve/CVE-2013-4535/" source="CVE"/>
		<reference ref_id="CVE-2013-4536" ref_url="https://www.suse.com/security/cve/CVE-2013-4536/" source="CVE"/>
		<reference ref_id="CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541/" source="CVE"/>
		<reference ref_id="CVE-2013-4542" ref_url="https://www.suse.com/security/cve/CVE-2013-4542/" source="CVE"/>
		<reference ref_id="CVE-2013-6399" ref_url="https://www.suse.com/security/cve/CVE-2013-6399/" source="CVE"/>
		<reference ref_id="CVE-2014-0182" ref_url="https://www.suse.com/security/cve/CVE-2014-0182/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:0927.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:0927.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4148/">CVE-2013-4148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4148">CVE-2013-4148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4149/">CVE-2013-4149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4149">CVE-2013-4149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4150/">CVE-2013-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4150">CVE-2013-4150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4151/">CVE-2013-4151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4151">CVE-2013-4151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4527">CVE-2013-4527 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4529">CVE-2013-4529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4535/">CVE-2013-4535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4535">CVE-2013-4535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4536/">CVE-2013-4536 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4536">CVE-2013-4536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4541">CVE-2013-4541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4542/">CVE-2013-4542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4542">CVE-2013-4542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6399/">CVE-2013-6399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6399">CVE-2013-6399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0182/">CVE-2014-0182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0182">CVE-2014-0182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0223">CVE-2014-0223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3461">CVE-2014-3461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820289" comment="libcacard-1.5.3-60.el7_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820290" comment="libcacard-devel-1.5.3-60.el7_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820291" comment="libcacard-tools-1.5.3-60.el7_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820292" comment="qemu-guest-agent-1.5.3-60.el7_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820293" comment="qemu-img-1.5.3-60.el7_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820294" comment="qemu-kvm-1.5.3-60.el7_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820295" comment="qemu-kvm-common-1.5.3-60.el7_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820296" comment="qemu-kvm-tools-1.5.3-60.el7_0.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:54" version="1" class="patch">
	<metadata>
		<title>security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3560" ref_url="https://www.suse.com/security/cve/CVE-2014-3560/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1008.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1008.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3560/">CVE-2014-3560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3560">CVE-2014-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820297" comment="libsmbclient-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820298" comment="libsmbclient-devel-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820299" comment="libwbclient-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820300" comment="libwbclient-devel-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820301" comment="samba-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820302" comment="samba-client-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820303" comment="samba-common-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820304" comment="samba-dc-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820305" comment="samba-dc-libs-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820306" comment="samba-devel-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820307" comment="samba-libs-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820308" comment="samba-pidl-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820309" comment="samba-python-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820310" comment="samba-test-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820311" comment="samba-test-devel-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820312" comment="samba-vfs-glusterfs-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820313" comment="samba-winbind-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820314" comment="samba-winbind-clients-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820315" comment="samba-winbind-krb5-locator-4.1.1-37.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820316" comment="samba-winbind-modules-4.1.1-37.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:55" version="1" class="patch">
	<metadata>
		<title>security update for resteasy-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3490" ref_url="https://www.suse.com/security/cve/CVE-2014-3490/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1011.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1011.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3490/">CVE-2014-3490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3490">CVE-2014-3490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820317" comment="resteasy-base-2.3.5-3.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820318" comment="resteasy-base-atom-provider-2.3.5-3.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820319" comment="resteasy-base-jackson-provider-2.3.5-3.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820320" comment="resteasy-base-javadoc-2.3.5-3.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820321" comment="resteasy-base-jaxb-provider-2.3.5-3.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820322" comment="resteasy-base-jaxrs-2.3.5-3.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820323" comment="resteasy-base-jaxrs-all-2.3.5-3.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820324" comment="resteasy-base-jaxrs-api-2.3.5-3.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820325" comment="resteasy-base-jettison-provider-2.3.5-3.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820326" comment="resteasy-base-providers-pom-2.3.5-3.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820327" comment="resteasy-base-tjws-2.3.5-3.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:56" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2013-7345" ref_url="https://www.suse.com/security/cve/CVE-2013-7345/" source="CVE"/>
		<reference ref_id="CVE-2014-0207" ref_url="https://www.suse.com/security/cve/CVE-2014-0207/" source="CVE"/>
		<reference ref_id="CVE-2014-0237" ref_url="https://www.suse.com/security/cve/CVE-2014-0237/" source="CVE"/>
		<reference ref_id="CVE-2014-0238" ref_url="https://www.suse.com/security/cve/CVE-2014-0238/" source="CVE"/>
		<reference ref_id="CVE-2014-3479" ref_url="https://www.suse.com/security/cve/CVE-2014-3479/" source="CVE"/>
		<reference ref_id="CVE-2014-3480" ref_url="https://www.suse.com/security/cve/CVE-2014-3480/" source="CVE"/>
		<reference ref_id="CVE-2014-3487" ref_url="https://www.suse.com/security/cve/CVE-2014-3487/" source="CVE"/>
		<reference ref_id="CVE-2014-3515" ref_url="https://www.suse.com/security/cve/CVE-2014-3515/" source="CVE"/>
		<reference ref_id="CVE-2014-4049" ref_url="https://www.suse.com/security/cve/CVE-2014-4049/" source="CVE"/>
		<reference ref_id="CVE-2014-4721" ref_url="https://www.suse.com/security/cve/CVE-2014-4721/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1013.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1013.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7345/">CVE-2013-7345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7345">CVE-2013-7345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0207/">CVE-2014-0207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0207">CVE-2014-0207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0237/">CVE-2014-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0237">CVE-2014-0237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0238/">CVE-2014-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0238">CVE-2014-0238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3479/">CVE-2014-3479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3479">CVE-2014-3479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3480/">CVE-2014-3480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3480">CVE-2014-3480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3487/">CVE-2014-3487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3487">CVE-2014-3487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3515/">CVE-2014-3515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3515">CVE-2014-3515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4049/">CVE-2014-4049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4049">CVE-2014-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4721/">CVE-2014-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4721">CVE-2014-4721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820328" comment="php-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820329" comment="php-bcmath-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820330" comment="php-cli-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820331" comment="php-common-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820332" comment="php-dba-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820333" comment="php-devel-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820334" comment="php-embedded-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820335" comment="php-enchant-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820336" comment="php-fpm-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820337" comment="php-gd-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820338" comment="php-intl-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820339" comment="php-ldap-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820340" comment="php-mbstring-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820341" comment="php-mysql-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820342" comment="php-mysqlnd-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820343" comment="php-odbc-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820344" comment="php-pdo-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820345" comment="php-pgsql-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820346" comment="php-process-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820347" comment="php-pspell-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820348" comment="php-recode-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820349" comment="php-snmp-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820350" comment="php-soap-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820351" comment="php-xml-5.4.16-23.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820352" comment="php-xmlrpc-5.4.16-23.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:57" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0181" ref_url="https://www.suse.com/security/cve/CVE-2014-0181/" source="CVE"/>
		<reference ref_id="CVE-2014-2672" ref_url="https://www.suse.com/security/cve/CVE-2014-2672/" source="CVE"/>
		<reference ref_id="CVE-2014-2673" ref_url="https://www.suse.com/security/cve/CVE-2014-2673/" source="CVE"/>
		<reference ref_id="CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706/" source="CVE"/>
		<reference ref_id="CVE-2014-3534" ref_url="https://www.suse.com/security/cve/CVE-2014-3534/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1023.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1023.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0181/">CVE-2014-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0181">CVE-2014-0181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2672/">CVE-2014-2672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2672">CVE-2014-2672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2673/">CVE-2014-2673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2673">CVE-2014-2673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2706">CVE-2014-2706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3534/">CVE-2014-3534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3534">CVE-2014-3534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4667">CVE-2014-4667 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820353" comment="kernel-3.10.0-123.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820354" comment="kernel-abi-whitelists-3.10.0-123.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820355" comment="kernel-debug-3.10.0-123.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820358" comment="kernel-doc-3.10.0-123.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820359" comment="kernel-headers-3.10.0-123.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820360" comment="kernel-tools-3.10.0-123.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820361" comment="kernel-tools-libs-3.10.0-123.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820363" comment="perf-3.10.0-123.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820364" comment="python-perf-3.10.0-123.6.3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:58" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0119" ref_url="https://www.suse.com/security/cve/CVE-2014-0119/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1034.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1034.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0119/">CVE-2014-0119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0119">CVE-2014-0119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820365" comment="tomcat-7.0.42-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820366" comment="tomcat-admin-webapps-7.0.42-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820367" comment="tomcat-docs-webapp-7.0.42-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820368" comment="tomcat-el-2.2-api-7.0.42-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820369" comment="tomcat-javadoc-7.0.42-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820370" comment="tomcat-jsp-2.2-api-7.0.42-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820371" comment="tomcat-jsvc-7.0.42-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820372" comment="tomcat-lib-7.0.42-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820373" comment="tomcat-servlet-3.0-api-7.0.42-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820374" comment="tomcat-webapps-7.0.42-8.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:59" version="1" class="patch">
	<metadata>
		<title>security update for nss (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1073.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1073.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1492">CVE-2014-1492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820375" comment="nss-3.16.2-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820376" comment="nss-devel-3.16.2-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820377" comment="nss-pkcs11-devel-3.16.2-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820378" comment="nss-softokn-3.16.2-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820379" comment="nss-softokn-devel-3.16.2-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820380" comment="nss-softokn-freebl-3.16.2-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820381" comment="nss-softokn-freebl-devel-3.16.2-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820382" comment="nss-sysinit-3.16.2-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820383" comment="nss-tools-3.16.2-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820384" comment="nss-util-3.16.2-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820385" comment="nss-util-devel-3.16.2-1.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:60" version="1" class="patch">
	<metadata>
		<title>security update for mod_wsgi (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0240" ref_url="https://www.suse.com/security/cve/CVE-2014-0240/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1091.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1091.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0240/">CVE-2014-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0240">CVE-2014-0240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820386" comment="mod_wsgi-3.4-12.el7_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:61" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1110.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1110.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0475">CVE-2014-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5119">CVE-2014-5119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820387" comment="glibc-2.17-55.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820388" comment="glibc-common-2.17-55.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820389" comment="glibc-devel-2.17-55.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820390" comment="glibc-headers-2.17-55.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820391" comment="glibc-static-2.17-55.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820392" comment="glibc-utils-2.17-55.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820393" comment="nscd-2.17-55.el7_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:62" version="1" class="patch">
	<metadata>
		<title>security update for httpcomponents-client (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1146.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1146.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3577">CVE-2014-3577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820394" comment="httpcomponents-client-4.2.5-5.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820395" comment="httpcomponents-client-javadoc-4.2.5-5.el7_0 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820394" comment="httpcomponents-client-4.2.5-5.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820395" comment="httpcomponents-client-javadoc-4.2.5-5.el7_0 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:63" version="1" class="patch">
	<metadata>
		<title>security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3609" ref_url="https://www.suse.com/security/cve/CVE-2014-3609/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1147.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1147.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3609/">CVE-2014-3609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3609">CVE-2014-3609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820396" comment="squid-3.3.8-12.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820397" comment="squid-sysvinit-3.3.8-12.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:64" version="1" class="patch">
	<metadata>
		<title>security update for jakarta-commons-httpclient (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1166.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1166.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3577">CVE-2014-3577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820398" comment="jakarta-commons-httpclient-3.1-16.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820399" comment="jakarta-commons-httpclient-demo-3.1-16.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820400" comment="jakarta-commons-httpclient-javadoc-3.1-16.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820401" comment="jakarta-commons-httpclient-manual-3.1-16.el7_0 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820398" comment="jakarta-commons-httpclient-3.1-16.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820399" comment="jakarta-commons-httpclient-demo-3.1-16.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820400" comment="jakarta-commons-httpclient-javadoc-3.1-16.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820401" comment="jakarta-commons-httpclient-manual-3.1-16.el7_0 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:65" version="1" class="patch">
	<metadata>
		<title>security update for procmail (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1172.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1172.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3618">CVE-2014-3618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820402" comment="procmail-3.22-34.el7_0.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:66" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3917" ref_url="https://www.suse.com/security/cve/CVE-2014-3917/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1281.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1281.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3917/">CVE-2014-3917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3917">CVE-2014-3917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820403" comment="kernel-3.10.0-123.8.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820404" comment="kernel-abi-whitelists-3.10.0-123.8.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820405" comment="kernel-debug-3.10.0-123.8.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820408" comment="kernel-doc-3.10.0-123.8.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820409" comment="kernel-headers-3.10.0-123.8.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820410" comment="kernel-tools-3.10.0-123.8.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820411" comment="kernel-tools-libs-3.10.0-123.8.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820413" comment="perf-3.10.0-123.8.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820414" comment="python-perf-3.10.0-123.8.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:67" version="1" class="patch">
	<metadata>
		<title>security update for haproxy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-6269" ref_url="https://www.suse.com/security/cve/CVE-2014-6269/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1292.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1292.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6269/">CVE-2014-6269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6269">CVE-2014-6269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820415" comment="haproxy-1.5.2-3.el7_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:68" version="1" class="patch">
	<metadata>
		<title>security update for bash (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1293.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1293.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-6271">CVE-2014-6271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820416" comment="bash-4.2.45-5.el7_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820417" comment="bash-doc-4.2.45-5.el7_0.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:69" version="1" class="patch">
	<metadata>
		<title>security update for nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1307.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1307.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1568">CVE-2014-1568 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820418" comment="nss-3.16.2-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820419" comment="nss-devel-3.16.2-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820420" comment="nss-pkcs11-devel-3.16.2-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820421" comment="nss-softokn-3.16.2-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820422" comment="nss-softokn-devel-3.16.2-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820423" comment="nss-softokn-freebl-3.16.2-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820424" comment="nss-softokn-freebl-devel-3.16.2-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820425" comment="nss-sysinit-3.16.2-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820426" comment="nss-tools-3.16.2-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820427" comment="nss-util-3.16.2-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820428" comment="nss-util-devel-3.16.2-2.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:70" version="1" class="patch">
	<metadata>
		<title>security update for xerces-j2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1319.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1319.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4002">CVE-2013-4002 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820429" comment="xerces-j2-2.11.0-17.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820430" comment="xerces-j2-demo-2.11.0-17.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820431" comment="xerces-j2-javadoc-2.11.0-17.el7_0 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820429" comment="xerces-j2-2.11.0-17.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820430" comment="xerces-j2-demo-2.11.0-17.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820431" comment="xerces-j2-javadoc-2.11.0-17.el7_0 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:71" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2014-3478" ref_url="https://www.suse.com/security/cve/CVE-2014-3478/" source="CVE"/>
		<reference ref_id="CVE-2014-3538" ref_url="https://www.suse.com/security/cve/CVE-2014-3538/" source="CVE"/>
		<reference ref_id="CVE-2014-3587" ref_url="https://www.suse.com/security/cve/CVE-2014-3587/" source="CVE"/>
		<reference ref_id="CVE-2014-3597" ref_url="https://www.suse.com/security/cve/CVE-2014-3597/" source="CVE"/>
		<reference ref_id="CVE-2014-4670" ref_url="https://www.suse.com/security/cve/CVE-2014-4670/" source="CVE"/>
		<reference ref_id="CVE-2014-4698" ref_url="https://www.suse.com/security/cve/CVE-2014-4698/" source="CVE"/>
		<reference ref_id="CVE-2014-5120" ref_url="https://www.suse.com/security/cve/CVE-2014-5120/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1327.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1327.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2497">CVE-2014-2497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3478/">CVE-2014-3478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3478">CVE-2014-3478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3538/">CVE-2014-3538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3538">CVE-2014-3538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3587/">CVE-2014-3587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3587">CVE-2014-3587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3597/">CVE-2014-3597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3597">CVE-2014-3597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4670/">CVE-2014-4670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4670">CVE-2014-4670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4698/">CVE-2014-4698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4698">CVE-2014-4698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5120/">CVE-2014-5120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5120">CVE-2014-5120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820432" comment="php-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820433" comment="php-bcmath-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820434" comment="php-cli-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820435" comment="php-common-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820436" comment="php-dba-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820437" comment="php-devel-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820438" comment="php-embedded-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820439" comment="php-enchant-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820440" comment="php-fpm-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820441" comment="php-gd-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820442" comment="php-intl-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820443" comment="php-ldap-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820444" comment="php-mbstring-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820445" comment="php-mysql-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820446" comment="php-mysqlnd-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820447" comment="php-odbc-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820448" comment="php-pdo-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820449" comment="php-pgsql-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820450" comment="php-process-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820451" comment="php-pspell-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820452" comment="php-recode-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820453" comment="php-snmp-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820454" comment="php-soap-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820455" comment="php-xml-5.4.16-23.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820456" comment="php-xmlrpc-5.4.16-23.el7_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:72" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1352.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1352.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3633">CVE-2014-3633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3657">CVE-2014-3657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820457" comment="libvirt-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820458" comment="libvirt-client-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820459" comment="libvirt-daemon-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820460" comment="libvirt-daemon-config-network-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820461" comment="libvirt-daemon-config-nwfilter-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820462" comment="libvirt-daemon-driver-interface-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820463" comment="libvirt-daemon-driver-lxc-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820464" comment="libvirt-daemon-driver-network-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820465" comment="libvirt-daemon-driver-nodedev-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820466" comment="libvirt-daemon-driver-nwfilter-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820467" comment="libvirt-daemon-driver-qemu-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820468" comment="libvirt-daemon-driver-secret-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820469" comment="libvirt-daemon-driver-storage-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820470" comment="libvirt-daemon-kvm-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820471" comment="libvirt-daemon-lxc-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820472" comment="libvirt-devel-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820473" comment="libvirt-docs-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820474" comment="libvirt-lock-sanlock-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820475" comment="libvirt-login-shell-1.1.1-29.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820476" comment="libvirt-python-1.1.1-29.el7_0.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:73" version="1" class="patch">
	<metadata>
		<title>security update for polkit-qt (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2014-5033" ref_url="https://www.suse.com/security/cve/CVE-2014-5033/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1359.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1359.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5033/">CVE-2014-5033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5033">CVE-2014-5033 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820477" comment="polkit-qt-0.103.0-10.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820478" comment="polkit-qt-devel-0.103.0-10.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820479" comment="polkit-qt-doc-0.103.0-10.el7_0 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820477" comment="polkit-qt-0.103.0-10.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820478" comment="polkit-qt-devel-0.103.0-10.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820479" comment="polkit-qt-doc-0.103.0-10.el7_0 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:74" version="1" class="patch">
	<metadata>
		<title>security update for rsyslog (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1397.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1397.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3634">CVE-2014-3634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820480" comment="rsyslog-7.4.7-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820481" comment="rsyslog-crypto-7.4.7-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820482" comment="rsyslog-doc-7.4.7-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820483" comment="rsyslog-elasticsearch-7.4.7-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820484" comment="rsyslog-gnutls-7.4.7-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820485" comment="rsyslog-gssapi-7.4.7-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820486" comment="rsyslog-libdbi-7.4.7-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820487" comment="rsyslog-mmaudit-7.4.7-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820488" comment="rsyslog-mmjsonparse-7.4.7-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820489" comment="rsyslog-mmnormalize-7.4.7-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820490" comment="rsyslog-mmsnmptrapd-7.4.7-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820491" comment="rsyslog-mysql-7.4.7-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820492" comment="rsyslog-pgsql-7.4.7-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820493" comment="rsyslog-relp-7.4.7-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820494" comment="rsyslog-snmp-7.4.7-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820495" comment="rsyslog-udpspoof-7.4.7-7.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517/" source="CVE"/>
		<reference ref_id="CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1620.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1620.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6457">CVE-2014-6457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6502">CVE-2014-6502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6504">CVE-2014-6504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6506">CVE-2014-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6511">CVE-2014-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6512">CVE-2014-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6517">CVE-2014-6517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6519">CVE-2014-6519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6531">CVE-2014-6531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6558">CVE-2014-6558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820496" comment="java-1.7.0-openjdk-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820497" comment="java-1.7.0-openjdk-accessibility-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820498" comment="java-1.7.0-openjdk-demo-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820499" comment="java-1.7.0-openjdk-devel-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820500" comment="java-1.7.0-openjdk-headless-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820501" comment="java-1.7.0-openjdk-javadoc-1.7.0.71-2.5.3.1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820502" comment="java-1.7.0-openjdk-src-1.7.0.71-2.5.3.1.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76" version="1" class="patch">
	<metadata>
		<title>security update for java-1.6.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517/" source="CVE"/>
		<reference ref_id="CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1634.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1634.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6457">CVE-2014-6457 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6502">CVE-2014-6502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6504">CVE-2014-6504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6506">CVE-2014-6506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6511">CVE-2014-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6512">CVE-2014-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6517">CVE-2014-6517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6519">CVE-2014-6519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6531">CVE-2014-6531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6558">CVE-2014-6558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820503" comment="java-1.6.0-openjdk-1.6.0.33-1.13.5.0.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820504" comment="java-1.6.0-openjdk-demo-1.6.0.33-1.13.5.0.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820505" comment="java-1.6.0-openjdk-devel-1.6.0.33-1.13.5.0.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820506" comment="java-1.6.0-openjdk-javadoc-1.6.0.33-1.13.5.0.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820507" comment="java-1.6.0-openjdk-src-1.6.0.33-1.13.5.0.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1635.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1635.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1574">CVE-2014-1574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1576">CVE-2014-1576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1577">CVE-2014-1577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1578">CVE-2014-1578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1581">CVE-2014-1581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1583">CVE-2014-1583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820508" comment="firefox-31.2.0-3.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820509" comment="xulrunner-31.2.0-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820510" comment="xulrunner-devel-31.2.0-1.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1652.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1652.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3513">CVE-2014-3513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3567">CVE-2014-3567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820511" comment="openssl-1.0.1e-34.el7_0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820512" comment="openssl-devel-1.0.1e-34.el7_0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820513" comment="openssl-libs-1.0.1e-34.el7_0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820514" comment="openssl-perl-1.0.1e-34.el7_0.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820515" comment="openssl-static-1.0.1e-34.el7_0.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1655.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1655.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3660">CVE-2014-3660 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820516" comment="libxml2-2.9.1-5.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820517" comment="libxml2-devel-2.9.1-5.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820518" comment="libxml2-python-2.9.1-5.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820519" comment="libxml2-static-2.9.1-5.el7_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3615" ref_url="https://www.suse.com/security/cve/CVE-2014-3615/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1669.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1669.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3615/">CVE-2014-3615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3615">CVE-2014-3615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820520" comment="libcacard-1.5.3-60.el7_0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820521" comment="libcacard-devel-1.5.3-60.el7_0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820522" comment="libcacard-tools-1.5.3-60.el7_0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820523" comment="qemu-guest-agent-1.5.3-60.el7_0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820524" comment="qemu-img-1.5.3-60.el7_0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820525" comment="qemu-kvm-1.5.3-60.el7_0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820526" comment="qemu-kvm-common-1.5.3-60.el7_0.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820527" comment="qemu-kvm-tools-1.5.3-60.el7_0.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81" version="1" class="patch">
	<metadata>
		<title>security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-6421" ref_url="https://www.suse.com/security/cve/CVE-2014-6421/" source="CVE"/>
		<reference ref_id="CVE-2014-6422" ref_url="https://www.suse.com/security/cve/CVE-2014-6422/" source="CVE"/>
		<reference ref_id="CVE-2014-6423" ref_url="https://www.suse.com/security/cve/CVE-2014-6423/" source="CVE"/>
		<reference ref_id="CVE-2014-6424" ref_url="https://www.suse.com/security/cve/CVE-2014-6424/" source="CVE"/>
		<reference ref_id="CVE-2014-6425" ref_url="https://www.suse.com/security/cve/CVE-2014-6425/" source="CVE"/>
		<reference ref_id="CVE-2014-6426" ref_url="https://www.suse.com/security/cve/CVE-2014-6426/" source="CVE"/>
		<reference ref_id="CVE-2014-6427" ref_url="https://www.suse.com/security/cve/CVE-2014-6427/" source="CVE"/>
		<reference ref_id="CVE-2014-6428" ref_url="https://www.suse.com/security/cve/CVE-2014-6428/" source="CVE"/>
		<reference ref_id="CVE-2014-6429" ref_url="https://www.suse.com/security/cve/CVE-2014-6429/" source="CVE"/>
		<reference ref_id="CVE-2014-6430" ref_url="https://www.suse.com/security/cve/CVE-2014-6430/" source="CVE"/>
		<reference ref_id="CVE-2014-6431" ref_url="https://www.suse.com/security/cve/CVE-2014-6431/" source="CVE"/>
		<reference ref_id="CVE-2014-6432" ref_url="https://www.suse.com/security/cve/CVE-2014-6432/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1676.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1676.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6421/">CVE-2014-6421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6421">CVE-2014-6421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6422/">CVE-2014-6422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6422">CVE-2014-6422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6423/">CVE-2014-6423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6423">CVE-2014-6423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6424/">CVE-2014-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6424">CVE-2014-6424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6425/">CVE-2014-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6425">CVE-2014-6425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6426/">CVE-2014-6426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6426">CVE-2014-6426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6427/">CVE-2014-6427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6427">CVE-2014-6427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6428/">CVE-2014-6428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6428">CVE-2014-6428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6429/">CVE-2014-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6429">CVE-2014-6429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6430/">CVE-2014-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6430">CVE-2014-6430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6431/">CVE-2014-6431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6431">CVE-2014-6431 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6432/">CVE-2014-6432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6432">CVE-2014-6432 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820528" comment="wireshark-1.10.3-12.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820529" comment="wireshark-devel-1.10.3-12.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820530" comment="wireshark-gnome-1.10.3-12.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:82" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3611" ref_url="https://www.suse.com/security/cve/CVE-2014-3611/" source="CVE"/>
		<reference ref_id="CVE-2014-3645" ref_url="https://www.suse.com/security/cve/CVE-2014-3645/" source="CVE"/>
		<reference ref_id="CVE-2014-3646" ref_url="https://www.suse.com/security/cve/CVE-2014-3646/" source="CVE"/>
		<reference ref_id="CVE-2014-4653" ref_url="https://www.suse.com/security/cve/CVE-2014-4653/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1724.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1724.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3611/">CVE-2014-3611 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3611">CVE-2014-3611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3645/">CVE-2014-3645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3645">CVE-2014-3645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3646/">CVE-2014-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3646">CVE-2014-3646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4653/">CVE-2014-4653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4653">CVE-2014-4653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5077">CVE-2014-5077 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820531" comment="kernel-3.10.0-123.9.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820532" comment="kernel-abi-whitelists-3.10.0-123.9.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820533" comment="kernel-debug-3.10.0-123.9.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820536" comment="kernel-doc-3.10.0-123.9.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820537" comment="kernel-headers-3.10.0-123.9.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820538" comment="kernel-tools-3.10.0-123.9.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820539" comment="kernel-tools-libs-3.10.0-123.9.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820541" comment="perf-3.10.0-123.9.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820542" comment="python-perf-3.10.0-123.9.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:83" version="1" class="patch">
	<metadata>
		<title>security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1764.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1764.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4877">CVE-2014-4877 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820543" comment="wget-1.14-10.el7_0.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:84" version="1" class="patch">
	<metadata>
		<title>security update for php (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1767.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1767.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3668">CVE-2014-3668 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3669">CVE-2014-3669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3670">CVE-2014-3670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3710">CVE-2014-3710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820544" comment="php-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820545" comment="php-bcmath-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820546" comment="php-cli-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820547" comment="php-common-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820548" comment="php-dba-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820549" comment="php-devel-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820550" comment="php-embedded-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820551" comment="php-enchant-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820552" comment="php-fpm-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820553" comment="php-gd-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820554" comment="php-intl-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820555" comment="php-ldap-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820556" comment="php-mbstring-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820557" comment="php-mysql-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820558" comment="php-mysqlnd-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820559" comment="php-odbc-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820560" comment="php-pdo-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820561" comment="php-pgsql-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820562" comment="php-process-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820563" comment="php-pspell-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820564" comment="php-recode-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820565" comment="php-snmp-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820566" comment="php-soap-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820567" comment="php-xml-5.4.16-23.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820568" comment="php-xmlrpc-5.4.16-23.el7_0.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:85" version="1" class="patch">
	<metadata>
		<title>security update for cups-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-4337" ref_url="https://www.suse.com/security/cve/CVE-2014-4337/" source="CVE"/>
		<reference ref_id="CVE-2014-4338" ref_url="https://www.suse.com/security/cve/CVE-2014-4338/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1795.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1795.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4337/">CVE-2014-4337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4337">CVE-2014-4337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4338/">CVE-2014-4338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4338">CVE-2014-4338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820569" comment="cups-filters-1.0.35-15.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820570" comment="cups-filters-devel-1.0.35-15.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820571" comment="cups-filters-libs-1.0.35-15.el7_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:86" version="1" class="patch">
	<metadata>
		<title>security update for libvncserver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1826.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1826.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6051">CVE-2014-6051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6052">CVE-2014-6052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6053">CVE-2014-6053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6054">CVE-2014-6054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6055">CVE-2014-6055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820572" comment="libvncserver-0.9.9-9.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820573" comment="libvncserver-devel-0.9.9-9.el7_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:87" version="1" class="patch">
	<metadata>
		<title>security update for kdenetwork (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1827.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1827.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6053">CVE-2014-6053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6054">CVE-2014-6054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6055">CVE-2014-6055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820574" comment="kdenetwork-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820575" comment="kdenetwork-common-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820576" comment="kdenetwork-devel-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820577" comment="kdenetwork-fileshare-samba-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820578" comment="kdenetwork-kdnssd-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820579" comment="kdenetwork-kget-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820580" comment="kdenetwork-kget-libs-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820581" comment="kdenetwork-kopete-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820582" comment="kdenetwork-kopete-devel-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820583" comment="kdenetwork-kopete-libs-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820584" comment="kdenetwork-krdc-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820585" comment="kdenetwork-krdc-devel-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820586" comment="kdenetwork-krdc-libs-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820587" comment="kdenetwork-krfb-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820588" comment="kdenetwork-krfb-libs-4.10.5-8.el7_0 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820574" comment="kdenetwork-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820575" comment="kdenetwork-common-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820576" comment="kdenetwork-devel-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820577" comment="kdenetwork-fileshare-samba-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820578" comment="kdenetwork-kdnssd-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820579" comment="kdenetwork-kget-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820580" comment="kdenetwork-kget-libs-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820581" comment="kdenetwork-kopete-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820582" comment="kdenetwork-kopete-devel-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820583" comment="kdenetwork-kopete-libs-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820584" comment="kdenetwork-krdc-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820585" comment="kdenetwork-krdc-devel-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820586" comment="kdenetwork-krdc-libs-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820587" comment="kdenetwork-krfb-4.10.5-8.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820588" comment="kdenetwork-krfb-libs-4.10.5-8.el7_0 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:88" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1846.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1846.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8564">CVE-2014-8564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820589" comment="gnutls-3.1.18-10.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820590" comment="gnutls-c++-3.1.18-10.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820591" comment="gnutls-dane-3.1.18-10.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820592" comment="gnutls-devel-3.1.18-10.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820593" comment="gnutls-utils-3.1.18-10.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:89" version="1" class="patch">
	<metadata>
		<title>security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4243" ref_url="https://www.suse.com/security/cve/CVE-2014-4243/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274/" source="CVE"/>
		<reference ref_id="CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287/" source="CVE"/>
		<reference ref_id="CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463/" source="CVE"/>
		<reference ref_id="CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464/" source="CVE"/>
		<reference ref_id="CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469/" source="CVE"/>
		<reference ref_id="CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484/" source="CVE"/>
		<reference ref_id="CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505/" source="CVE"/>
		<reference ref_id="CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507/" source="CVE"/>
		<reference ref_id="CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520/" source="CVE"/>
		<reference ref_id="CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530/" source="CVE"/>
		<reference ref_id="CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551/" source="CVE"/>
		<reference ref_id="CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555/" source="CVE"/>
		<reference ref_id="CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1861.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1861.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2494">CVE-2014-2494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4207">CVE-2014-4207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4243/">CVE-2014-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4243">CVE-2014-4243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4258">CVE-2014-4258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4260">CVE-2014-4260 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4274">CVE-2014-4274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4287">CVE-2014-4287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6463">CVE-2014-6463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6464">CVE-2014-6464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6469">CVE-2014-6469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6484">CVE-2014-6484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6505">CVE-2014-6505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6507">CVE-2014-6507 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6520">CVE-2014-6520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6530">CVE-2014-6530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6551">CVE-2014-6551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6555">CVE-2014-6555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6559">CVE-2014-6559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820594" comment="mariadb-5.5.40-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820595" comment="mariadb-bench-5.5.40-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820596" comment="mariadb-devel-5.5.40-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820597" comment="mariadb-embedded-5.5.40-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820598" comment="mariadb-embedded-devel-5.5.40-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820599" comment="mariadb-libs-5.5.40-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820600" comment="mariadb-server-5.5.40-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820601" comment="mariadb-test-5.5.40-1.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:90" version="1" class="patch">
	<metadata>
		<title>security update for libXfont (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1870.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1870.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0209">CVE-2014-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0210">CVE-2014-0210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0211">CVE-2014-0211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820602" comment="libXfont-1.4.7-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820603" comment="libXfont-devel-1.4.7-2.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:91" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-4975" ref_url="https://www.suse.com/security/cve/CVE-2014-4975/" source="CVE"/>
		<reference ref_id="CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080/" source="CVE"/>
		<reference ref_id="CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1912.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1912.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4975/">CVE-2014-4975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4975">CVE-2014-4975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8080">CVE-2014-8080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8090">CVE-2014-8090 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820604" comment="ruby-2.0.0.353-22.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820605" comment="ruby-devel-2.0.0.353-22.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820606" comment="ruby-doc-2.0.0.353-22.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820607" comment="ruby-irb-2.0.0.353-22.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820608" comment="ruby-libs-2.0.0.353-22.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820609" comment="ruby-tcltk-2.0.0.353-22.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820610" comment="rubygem-bigdecimal-1.2.0-22.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820611" comment="rubygem-io-console-0.4.2-22.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820612" comment="rubygem-json-1.7.7-22.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820613" comment="rubygem-minitest-4.3.2-22.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820614" comment="rubygem-psych-2.0.0-22.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820615" comment="rubygem-rake-0.9.6-22.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820616" comment="rubygem-rdoc-4.0.0-22.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820617" comment="rubygems-2.0.14-22.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820618" comment="rubygems-devel-2.0.14-22.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:92" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1919.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1919.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1587">CVE-2014-1587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1590">CVE-2014-1590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1592">CVE-2014-1592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1593">CVE-2014-1593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1594">CVE-2014-1594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820619" comment="firefox-31.3.0-3.el7_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93" version="1" class="patch">
	<metadata>
		<title>security update for nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<description>
This security update provides a functional equivalent of RHSA-2014:1948.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1948.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820620" comment="nss-3.16.2.3-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820621" comment="nss-devel-3.16.2.3-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820622" comment="nss-pkcs11-devel-3.16.2.3-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820623" comment="nss-softokn-3.16.2.3-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820624" comment="nss-softokn-devel-3.16.2.3-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820625" comment="nss-softokn-freebl-3.16.2.3-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820626" comment="nss-softokn-freebl-devel-3.16.2.3-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820627" comment="nss-sysinit-3.16.2.3-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820628" comment="nss-tools-3.16.2.3-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820629" comment="nss-util-3.16.2.3-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820630" comment="nss-util-devel-3.16.2.3-1.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94" version="1" class="patch">
	<metadata>
		<title>security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1956.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1956.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3686">CVE-2014-3686 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820631" comment="wpa_supplicant-2.0-13.el7_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:95" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2013-2929" ref_url="https://www.suse.com/security/cve/CVE-2013-2929/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-3181" ref_url="https://www.suse.com/security/cve/CVE-2014-3181/" source="CVE"/>
		<reference ref_id="CVE-2014-3182" ref_url="https://www.suse.com/security/cve/CVE-2014-3182/" source="CVE"/>
		<reference ref_id="CVE-2014-3184" ref_url="https://www.suse.com/security/cve/CVE-2014-3184/" source="CVE"/>
		<reference ref_id="CVE-2014-3185" ref_url="https://www.suse.com/security/cve/CVE-2014-3185/" source="CVE"/>
		<reference ref_id="CVE-2014-3186" ref_url="https://www.suse.com/security/cve/CVE-2014-3186/" source="CVE"/>
		<reference ref_id="CVE-2014-3631" ref_url="https://www.suse.com/security/cve/CVE-2014-3631/" source="CVE"/>
		<reference ref_id="CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673/" source="CVE"/>
		<reference ref_id="CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687/" source="CVE"/>
		<reference ref_id="CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688/" source="CVE"/>
		<reference ref_id="CVE-2014-4027" ref_url="https://www.suse.com/security/cve/CVE-2014-4027/" source="CVE"/>
		<reference ref_id="CVE-2014-4652" ref_url="https://www.suse.com/security/cve/CVE-2014-4652/" source="CVE"/>
		<reference ref_id="CVE-2014-4654" ref_url="https://www.suse.com/security/cve/CVE-2014-4654/" source="CVE"/>
		<reference ref_id="CVE-2014-4655" ref_url="https://www.suse.com/security/cve/CVE-2014-4655/" source="CVE"/>
		<reference ref_id="CVE-2014-4656" ref_url="https://www.suse.com/security/cve/CVE-2014-4656/" source="CVE"/>
		<reference ref_id="CVE-2014-5045" ref_url="https://www.suse.com/security/cve/CVE-2014-5045/" source="CVE"/>
		<reference ref_id="CVE-2014-6410" ref_url="https://www.suse.com/security/cve/CVE-2014-6410/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1971.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1971.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2929/">CVE-2013-2929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2929">CVE-2013-2929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1739">CVE-2014-1739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3181/">CVE-2014-3181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3181">CVE-2014-3181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3182/">CVE-2014-3182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3182">CVE-2014-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3184/">CVE-2014-3184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3184">CVE-2014-3184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3185/">CVE-2014-3185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3185">CVE-2014-3185 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3186/">CVE-2014-3186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3186">CVE-2014-3186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3631/">CVE-2014-3631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3631">CVE-2014-3631 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3673">CVE-2014-3673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3687">CVE-2014-3687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3688">CVE-2014-3688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4027/">CVE-2014-4027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4027">CVE-2014-4027 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4652/">CVE-2014-4652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4652">CVE-2014-4652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4654/">CVE-2014-4654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4654">CVE-2014-4654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4655/">CVE-2014-4655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4655">CVE-2014-4655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4656/">CVE-2014-4656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4656">CVE-2014-4656 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5045/">CVE-2014-5045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5045">CVE-2014-5045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6410/">CVE-2014-6410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6410">CVE-2014-6410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820632" comment="kernel-3.10.0-123.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820633" comment="kernel-abi-whitelists-3.10.0-123.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820634" comment="kernel-debug-3.10.0-123.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820637" comment="kernel-doc-3.10.0-123.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820638" comment="kernel-headers-3.10.0-123.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820639" comment="kernel-tools-3.10.0-123.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820640" comment="kernel-tools-libs-3.10.0-123.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820642" comment="perf-3.10.0-123.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820643" comment="python-perf-3.10.0-123.13.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:96" version="1" class="patch">
	<metadata>
		<title>security update for rpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1976.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1976.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6435">CVE-2013-6435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8118">CVE-2014-8118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820644" comment="rpm-4.11.1-18.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820645" comment="rpm-apidocs-4.11.1-18.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820646" comment="rpm-build-4.11.1-18.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820647" comment="rpm-build-libs-4.11.1-18.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820648" comment="rpm-cron-4.11.1-18.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820649" comment="rpm-devel-4.11.1-18.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820650" comment="rpm-libs-4.11.1-18.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820651" comment="rpm-python-4.11.1-18.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820652" comment="rpm-sign-4.11.1-18.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:97" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091/" source="CVE"/>
		<reference ref_id="CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092/" source="CVE"/>
		<reference ref_id="CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093/" source="CVE"/>
		<reference ref_id="CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094/" source="CVE"/>
		<reference ref_id="CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095/" source="CVE"/>
		<reference ref_id="CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096/" source="CVE"/>
		<reference ref_id="CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097/" source="CVE"/>
		<reference ref_id="CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098/" source="CVE"/>
		<reference ref_id="CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099/" source="CVE"/>
		<reference ref_id="CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100/" source="CVE"/>
		<reference ref_id="CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101/" source="CVE"/>
		<reference ref_id="CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102/" source="CVE"/>
		<reference ref_id="CVE-2014-8103" ref_url="https://www.suse.com/security/cve/CVE-2014-8103/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1983.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1983.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8091">CVE-2014-8091 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8092">CVE-2014-8092 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8093">CVE-2014-8093 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8094">CVE-2014-8094 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8095">CVE-2014-8095 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8096">CVE-2014-8096 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8097">CVE-2014-8097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8098">CVE-2014-8098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8099">CVE-2014-8099 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8100">CVE-2014-8100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8101">CVE-2014-8101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8102">CVE-2014-8102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8103/">CVE-2014-8103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8103">CVE-2014-8103 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820653" comment="xorg-x11-server-Xdmx-1.15.0-7.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820654" comment="xorg-x11-server-Xephyr-1.15.0-7.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820655" comment="xorg-x11-server-Xnest-1.15.0-7.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820656" comment="xorg-x11-server-Xorg-1.15.0-7.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820657" comment="xorg-x11-server-Xvfb-1.15.0-7.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820658" comment="xorg-x11-server-common-1.15.0-7.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820659" comment="xorg-x11-server-devel-1.15.0-7.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820660" comment="xorg-x11-server-source-1.15.0-7.el7_0.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:98" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1984.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1984.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8500">CVE-2014-8500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820661" comment="bind-9.9.4-14.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820662" comment="bind-chroot-9.9.4-14.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820663" comment="bind-devel-9.9.4-14.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820664" comment="bind-libs-9.9.4-14.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820665" comment="bind-libs-lite-9.9.4-14.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820666" comment="bind-license-9.9.4-14.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820667" comment="bind-lite-devel-9.9.4-14.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820668" comment="bind-sdb-9.9.4-14.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820669" comment="bind-sdb-chroot-9.9.4-14.el7_0.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820670" comment="bind-utils-9.9.4-14.el7_0.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:99" version="1" class="patch">
	<metadata>
		<title>security update for mailx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:1999.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:1999.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-2771">CVE-2004-2771 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7844">CVE-2014-7844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820671" comment="mailx-12.5-12.el7_0 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:100" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-9322" ref_url="https://www.suse.com/security/cve/CVE-2014-9322/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:2010.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:2010.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9322/">CVE-2014-9322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9322">CVE-2014-9322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820672" comment="kernel-3.10.0-123.13.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820673" comment="kernel-abi-whitelists-3.10.0-123.13.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820674" comment="kernel-debug-3.10.0-123.13.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820677" comment="kernel-doc-3.10.0-123.13.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820678" comment="kernel-headers-3.10.0-123.13.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820679" comment="kernel-tools-3.10.0-123.13.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820680" comment="kernel-tools-libs-3.10.0-123.13.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820682" comment="perf-3.10.0-123.13.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820683" comment="python-perf-3.10.0-123.13.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:101" version="1" class="patch">
	<metadata>
		<title>security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:2021.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:2021.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8137">CVE-2014-8137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8138">CVE-2014-8138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9029">CVE-2014-9029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820684" comment="jasper-1.900.1-26.el7_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820685" comment="jasper-devel-1.900.1-26.el7_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820686" comment="jasper-libs-1.900.1-26.el7_0.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820687" comment="jasper-utils-1.900.1-26.el7_0.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:102" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:2023.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:2023.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7817">CVE-2014-7817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820688" comment="glibc-2.17-55.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820689" comment="glibc-common-2.17-55.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820690" comment="glibc-devel-2.17-55.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820691" comment="glibc-headers-2.17-55.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820692" comment="glibc-static-2.17-55.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820693" comment="glibc-utils-2.17-55.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820694" comment="nscd-2.17-55.el7_0.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:103" version="1" class="patch">
	<metadata>
		<title>security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293/" source="CVE"/>
		<reference ref_id="CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294/" source="CVE"/>
		<reference ref_id="CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295/" source="CVE"/>
		<reference ref_id="CVE-2014-9296" ref_url="https://www.suse.com/security/cve/CVE-2014-9296/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2014:2024.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2014:2024.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9293">CVE-2014-9293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9294">CVE-2014-9294 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9295">CVE-2014-9295 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9296/">CVE-2014-9296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9296">CVE-2014-9296 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820695" comment="ntp-4.2.6p5-19.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820696" comment="ntp-doc-4.2.6p5-19.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820697" comment="ntp-perl-4.2.6p5-19.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820698" comment="ntpdate-4.2.6p5-19.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820699" comment="sntp-4.2.6p5-19.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:104" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0008.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0008.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7823">CVE-2014-7823 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820700" comment="libvirt-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820701" comment="libvirt-client-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820702" comment="libvirt-daemon-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820703" comment="libvirt-daemon-config-network-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820704" comment="libvirt-daemon-config-nwfilter-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820705" comment="libvirt-daemon-driver-interface-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820706" comment="libvirt-daemon-driver-lxc-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820707" comment="libvirt-daemon-driver-network-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820708" comment="libvirt-daemon-driver-nodedev-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820709" comment="libvirt-daemon-driver-nwfilter-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820710" comment="libvirt-daemon-driver-qemu-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820711" comment="libvirt-daemon-driver-secret-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820712" comment="libvirt-daemon-driver-storage-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820713" comment="libvirt-daemon-kvm-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820714" comment="libvirt-daemon-lxc-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820715" comment="libvirt-devel-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820716" comment="libvirt-docs-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820717" comment="libvirt-lock-sanlock-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820718" comment="libvirt-login-shell-1.1.1-29.el7_0.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820719" comment="libvirt-python-1.1.1-29.el7_0.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:105" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0046.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0046.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8634">CVE-2014-8634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8638">CVE-2014-8638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8639">CVE-2014-8639 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8641">CVE-2014-8641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820720" comment="firefox-31.4.0-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820721" comment="xulrunner-31.4.0-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820722" comment="xulrunner-devel-31.4.0-1.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:106" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0066.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0066.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0206">CVE-2015-0206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820723" comment="openssl-1.0.1e-34.el7_0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820724" comment="openssl-devel-1.0.1e-34.el7_0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820725" comment="openssl-libs-1.0.1e-34.el7_0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820726" comment="openssl-perl-1.0.1e-34.el7_0.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820727" comment="openssl-static-1.0.1e-34.el7_0.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:107" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-6585" ref_url="https://www.suse.com/security/cve/CVE-2014-6585/" source="CVE"/>
		<reference ref_id="CVE-2014-6587" ref_url="https://www.suse.com/security/cve/CVE-2014-6587/" source="CVE"/>
		<reference ref_id="CVE-2014-6591" ref_url="https://www.suse.com/security/cve/CVE-2014-6591/" source="CVE"/>
		<reference ref_id="CVE-2014-6593" ref_url="https://www.suse.com/security/cve/CVE-2014-6593/" source="CVE"/>
		<reference ref_id="CVE-2014-6601" ref_url="https://www.suse.com/security/cve/CVE-2014-6601/" source="CVE"/>
		<reference ref_id="CVE-2015-0383" ref_url="https://www.suse.com/security/cve/CVE-2015-0383/" source="CVE"/>
		<reference ref_id="CVE-2015-0395" ref_url="https://www.suse.com/security/cve/CVE-2015-0395/" source="CVE"/>
		<reference ref_id="CVE-2015-0407" ref_url="https://www.suse.com/security/cve/CVE-2015-0407/" source="CVE"/>
		<reference ref_id="CVE-2015-0408" ref_url="https://www.suse.com/security/cve/CVE-2015-0408/" source="CVE"/>
		<reference ref_id="CVE-2015-0410" ref_url="https://www.suse.com/security/cve/CVE-2015-0410/" source="CVE"/>
		<reference ref_id="CVE-2015-0412" ref_url="https://www.suse.com/security/cve/CVE-2015-0412/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0067.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0067.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6585/">CVE-2014-6585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6585">CVE-2014-6585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6587/">CVE-2014-6587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6587">CVE-2014-6587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6591/">CVE-2014-6591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6591">CVE-2014-6591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6593/">CVE-2014-6593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6593">CVE-2014-6593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6601/">CVE-2014-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6601">CVE-2014-6601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0383/">CVE-2015-0383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0383">CVE-2015-0383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0395/">CVE-2015-0395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0395">CVE-2015-0395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0407/">CVE-2015-0407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0407">CVE-2015-0407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0408/">CVE-2015-0408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0408">CVE-2015-0408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0410/">CVE-2015-0410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0410">CVE-2015-0410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0412/">CVE-2015-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0412">CVE-2015-0412 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820728" comment="java-1.7.0-openjdk-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820729" comment="java-1.7.0-openjdk-accessibility-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820730" comment="java-1.7.0-openjdk-demo-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820731" comment="java-1.7.0-openjdk-devel-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820732" comment="java-1.7.0-openjdk-headless-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820733" comment="java-1.7.0-openjdk-javadoc-1.7.0.75-2.5.4.2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820734" comment="java-1.7.0-openjdk-src-1.7.0.75-2.5.4.2.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:108" version="1" class="patch">
	<metadata>
		<title>security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0074.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0074.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8157">CVE-2014-8157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8158">CVE-2014-8158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820735" comment="jasper-1.900.1-26.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820736" comment="jasper-devel-1.900.1-26.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820737" comment="jasper-libs-1.900.1-26.el7_0.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820738" comment="jasper-utils-1.900.1-26.el7_0.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109" version="1" class="patch">
	<metadata>
		<title>security update for java-1.6.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-6585" ref_url="https://www.suse.com/security/cve/CVE-2014-6585/" source="CVE"/>
		<reference ref_id="CVE-2014-6587" ref_url="https://www.suse.com/security/cve/CVE-2014-6587/" source="CVE"/>
		<reference ref_id="CVE-2014-6591" ref_url="https://www.suse.com/security/cve/CVE-2014-6591/" source="CVE"/>
		<reference ref_id="CVE-2014-6593" ref_url="https://www.suse.com/security/cve/CVE-2014-6593/" source="CVE"/>
		<reference ref_id="CVE-2014-6601" ref_url="https://www.suse.com/security/cve/CVE-2014-6601/" source="CVE"/>
		<reference ref_id="CVE-2015-0383" ref_url="https://www.suse.com/security/cve/CVE-2015-0383/" source="CVE"/>
		<reference ref_id="CVE-2015-0395" ref_url="https://www.suse.com/security/cve/CVE-2015-0395/" source="CVE"/>
		<reference ref_id="CVE-2015-0407" ref_url="https://www.suse.com/security/cve/CVE-2015-0407/" source="CVE"/>
		<reference ref_id="CVE-2015-0408" ref_url="https://www.suse.com/security/cve/CVE-2015-0408/" source="CVE"/>
		<reference ref_id="CVE-2015-0410" ref_url="https://www.suse.com/security/cve/CVE-2015-0410/" source="CVE"/>
		<reference ref_id="CVE-2015-0412" ref_url="https://www.suse.com/security/cve/CVE-2015-0412/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0085.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0085.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3566">CVE-2014-3566 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6585/">CVE-2014-6585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6585">CVE-2014-6585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6587/">CVE-2014-6587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6587">CVE-2014-6587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6591/">CVE-2014-6591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6591">CVE-2014-6591 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6593/">CVE-2014-6593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6593">CVE-2014-6593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6601/">CVE-2014-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6601">CVE-2014-6601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0383/">CVE-2015-0383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0383">CVE-2015-0383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0395/">CVE-2015-0395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0395">CVE-2015-0395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0407/">CVE-2015-0407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0407">CVE-2015-0407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0408/">CVE-2015-0408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0408">CVE-2015-0408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0410/">CVE-2015-0410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0410">CVE-2015-0410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0412/">CVE-2015-0412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0412">CVE-2015-0412 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820739" comment="java-1.6.0-openjdk-1.6.0.34-1.13.6.1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820740" comment="java-1.6.0-openjdk-demo-1.6.0.34-1.13.6.1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820741" comment="java-1.6.0-openjdk-devel-1.6.0.34-1.13.6.1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820742" comment="java-1.6.0-openjdk-javadoc-1.6.0.34-1.13.6.1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820743" comment="java-1.6.0-openjdk-src-1.6.0.34-1.13.6.1.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0092.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0092.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0235">CVE-2015-0235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820744" comment="glibc-2.17-55.el7_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820745" comment="glibc-common-2.17-55.el7_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820746" comment="glibc-devel-2.17-55.el7_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820747" comment="glibc-headers-2.17-55.el7_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820748" comment="glibc-static-2.17-55.el7_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820749" comment="glibc-utils-2.17-55.el7_0.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820750" comment="nscd-2.17-55.el7_0.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111" version="1" class="patch">
	<metadata>
		<title>security update for libyaml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0100.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0100.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9130">CVE-2014-9130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820751" comment="libyaml-0.1.4-11.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820752" comment="libyaml-devel-0.1.4-11.el7_0 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820751" comment="libyaml-0.1.4-11.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820752" comment="libyaml-devel-0.1.4-11.el7_0 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<reference ref_id="CVE-2014-7145" ref_url="https://www.suse.com/security/cve/CVE-2014-7145/" source="CVE"/>
		<reference ref_id="CVE-2014-7822" ref_url="https://www.suse.com/security/cve/CVE-2014-7822/" source="CVE"/>
		<reference ref_id="CVE-2014-7841" ref_url="https://www.suse.com/security/cve/CVE-2014-7841/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0102.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0102.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4171">CVE-2014-4171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5471">CVE-2014-5471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5472">CVE-2014-5472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7145/">CVE-2014-7145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7145">CVE-2014-7145 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7822/">CVE-2014-7822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7822">CVE-2014-7822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7841/">CVE-2014-7841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7841">CVE-2014-7841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820753" comment="kernel-3.10.0-123.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820754" comment="kernel-abi-whitelists-3.10.0-123.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820755" comment="kernel-debug-3.10.0-123.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820758" comment="kernel-doc-3.10.0-123.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820759" comment="kernel-headers-3.10.0-123.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820760" comment="kernel-tools-3.10.0-123.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820761" comment="kernel-tools-libs-3.10.0-123.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820763" comment="perf-3.10.0-123.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820764" comment="python-perf-3.10.0-123.20.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:113" version="1" class="patch">
	<metadata>
		<title>security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568/" source="CVE"/>
		<reference ref_id="CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374/" source="CVE"/>
		<reference ref_id="CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381/" source="CVE"/>
		<reference ref_id="CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382/" source="CVE"/>
		<reference ref_id="CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391/" source="CVE"/>
		<reference ref_id="CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411/" source="CVE"/>
		<reference ref_id="CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0118.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0118.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6568">CVE-2014-6568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0374">CVE-2015-0374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0381">CVE-2015-0381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0382">CVE-2015-0382 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0391">CVE-2015-0391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0411">CVE-2015-0411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0432">CVE-2015-0432 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820765" comment="mariadb-5.5.41-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820766" comment="mariadb-bench-5.5.41-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820767" comment="mariadb-devel-5.5.41-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820768" comment="mariadb-embedded-5.5.41-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820769" comment="mariadb-embedded-devel-5.5.41-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820770" comment="mariadb-libs-5.5.41-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820771" comment="mariadb-server-5.5.41-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820772" comment="mariadb-test-5.5.41-2.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:114" version="1" class="patch">
	<metadata>
		<title>security update for subversion (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3528" ref_url="https://www.suse.com/security/cve/CVE-2014-3528/" source="CVE"/>
		<reference ref_id="CVE-2014-3580" ref_url="https://www.suse.com/security/cve/CVE-2014-3580/" source="CVE"/>
		<reference ref_id="CVE-2014-8108" ref_url="https://www.suse.com/security/cve/CVE-2014-8108/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0166.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0166.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3528/">CVE-2014-3528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3528">CVE-2014-3528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3580/">CVE-2014-3580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3580">CVE-2014-3580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8108/">CVE-2014-8108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8108">CVE-2014-8108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820773" comment="mod_dav_svn-1.7.14-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820774" comment="subversion-1.7.14-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820775" comment="subversion-devel-1.7.14-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820776" comment="subversion-gnome-1.7.14-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820777" comment="subversion-javahl-1.7.14-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820778" comment="subversion-kde-1.7.14-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820779" comment="subversion-libs-1.7.14-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820780" comment="subversion-perl-1.7.14-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820781" comment="subversion-python-1.7.14-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820782" comment="subversion-ruby-1.7.14-7.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820783" comment="subversion-tools-1.7.14-7.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:115" version="1" class="patch">
	<metadata>
		<title>security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0252.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0252.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0240">CVE-2015-0240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820784" comment="libsmbclient-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820785" comment="libsmbclient-devel-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820786" comment="libwbclient-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820787" comment="libwbclient-devel-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820788" comment="samba-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820789" comment="samba-client-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820790" comment="samba-common-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820791" comment="samba-dc-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820792" comment="samba-dc-libs-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820793" comment="samba-devel-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820794" comment="samba-libs-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820795" comment="samba-pidl-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820796" comment="samba-python-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820797" comment="samba-test-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820798" comment="samba-test-devel-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820799" comment="samba-vfs-glusterfs-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820800" comment="samba-winbind-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820801" comment="samba-winbind-clients-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820802" comment="samba-winbind-krb5-locator-4.1.1-38.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820803" comment="samba-winbind-modules-4.1.1-38.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:116" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0265.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0265.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0822">CVE-2015-0822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0827">CVE-2015-0827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0831">CVE-2015-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0836">CVE-2015-0836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820804" comment="firefox-31.5.0-2.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820805" comment="xulrunner-31.5.0-1.el7_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820806" comment="xulrunner-devel-31.5.0-1.el7_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:117" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3690" ref_url="https://www.suse.com/security/cve/CVE-2014-3690/" source="CVE"/>
		<reference ref_id="CVE-2014-3940" ref_url="https://www.suse.com/security/cve/CVE-2014-3940/" source="CVE"/>
		<reference ref_id="CVE-2014-7825" ref_url="https://www.suse.com/security/cve/CVE-2014-7825/" source="CVE"/>
		<reference ref_id="CVE-2014-7826" ref_url="https://www.suse.com/security/cve/CVE-2014-7826/" source="CVE"/>
		<reference ref_id="CVE-2014-8086" ref_url="https://www.suse.com/security/cve/CVE-2014-8086/" source="CVE"/>
		<reference ref_id="CVE-2014-8160" ref_url="https://www.suse.com/security/cve/CVE-2014-8160/" source="CVE"/>
		<reference ref_id="CVE-2014-8172" ref_url="https://www.suse.com/security/cve/CVE-2014-8172/" source="CVE"/>
		<reference ref_id="CVE-2014-8173" ref_url="https://www.suse.com/security/cve/CVE-2014-8173/" source="CVE"/>
		<reference ref_id="CVE-2014-8709" ref_url="https://www.suse.com/security/cve/CVE-2014-8709/" source="CVE"/>
		<reference ref_id="CVE-2014-8884" ref_url="https://www.suse.com/security/cve/CVE-2014-8884/" source="CVE"/>
		<reference ref_id="CVE-2015-0274" ref_url="https://www.suse.com/security/cve/CVE-2015-0274/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0290.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0290.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3690/">CVE-2014-3690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3690">CVE-2014-3690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3940/">CVE-2014-3940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3940">CVE-2014-3940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7825/">CVE-2014-7825 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7825">CVE-2014-7825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7826/">CVE-2014-7826 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7826">CVE-2014-7826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8086/">CVE-2014-8086 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8086">CVE-2014-8086 at NVD</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2014-8160/">CVE-2014-8160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8160">CVE-2014-8160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8172/">CVE-2014-8172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8172">CVE-2014-8172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8173/">CVE-2014-8173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8173">CVE-2014-8173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8709/">CVE-2014-8709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8709">CVE-2014-8709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8884/">CVE-2014-8884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8884">CVE-2014-8884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0274/">CVE-2015-0274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0274">CVE-2015-0274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820807" comment="kernel-3.10.0-229.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820808" comment="kernel-abi-whitelists-3.10.0-229.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820809" comment="kernel-debug-3.10.0-229.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820812" comment="kernel-doc-3.10.0-229.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820813" comment="kernel-headers-3.10.0-229.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820814" comment="kernel-tools-3.10.0-229.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820815" comment="kernel-tools-libs-3.10.0-229.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820817" comment="perf-3.10.0-229.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820818" comment="python-perf-3.10.0-229.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:118" version="1" class="patch">
	<metadata>
		<title>security update for hivex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-9273" ref_url="https://www.suse.com/security/cve/CVE-2014-9273/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0301.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0301.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9273/">CVE-2014-9273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9273">CVE-2014-9273 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820819" comment="hivex-1.3.10-5.7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820820" comment="hivex-devel-1.3.10-5.7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820821" comment="ocaml-hivex-1.3.10-5.7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820822" comment="ocaml-hivex-devel-1.3.10-5.7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820823" comment="perl-hivex-1.3.10-5.7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820824" comment="python-hivex-1.3.10-5.7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820825" comment="ruby-hivex-1.3.10-5.7.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:119" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8136" ref_url="https://www.suse.com/security/cve/CVE-2014-8136/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0323.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0323.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8136/">CVE-2014-8136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8136">CVE-2014-8136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0236">CVE-2015-0236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820826" comment="libvirt-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820827" comment="libvirt-client-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820828" comment="libvirt-daemon-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820829" comment="libvirt-daemon-config-network-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820830" comment="libvirt-daemon-config-nwfilter-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820831" comment="libvirt-daemon-driver-interface-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820832" comment="libvirt-daemon-driver-lxc-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820833" comment="libvirt-daemon-driver-network-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820834" comment="libvirt-daemon-driver-nodedev-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820835" comment="libvirt-daemon-driver-nwfilter-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820836" comment="libvirt-daemon-driver-qemu-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820837" comment="libvirt-daemon-driver-secret-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820838" comment="libvirt-daemon-driver-storage-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820839" comment="libvirt-daemon-kvm-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820840" comment="libvirt-daemon-lxc-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820841" comment="libvirt-devel-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820842" comment="libvirt-docs-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820843" comment="libvirt-lock-sanlock-1.2.8-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820844" comment="libvirt-login-shell-1.2.8-16.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:120" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2013-5704" ref_url="https://www.suse.com/security/cve/CVE-2013-5704/" source="CVE"/>
		<reference ref_id="CVE-2014-3581" ref_url="https://www.suse.com/security/cve/CVE-2014-3581/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0325.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0325.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5704/">CVE-2013-5704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-5704">CVE-2013-5704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3581/">CVE-2014-3581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3581">CVE-2014-3581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820845" comment="httpd-2.4.6-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820846" comment="httpd-devel-2.4.6-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820847" comment="httpd-manual-2.4.6-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820848" comment="httpd-tools-2.4.6-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820849" comment="mod_ldap-2.4.6-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820850" comment="mod_proxy_html-2.4.6-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820851" comment="mod_session-2.4.6-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820852" comment="mod_ssl-2.4.6-31.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:121" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0327.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0327.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6040">CVE-2014-6040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8121">CVE-2014-8121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820853" comment="glibc-2.17-78.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820854" comment="glibc-common-2.17-78.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820855" comment="glibc-devel-2.17-78.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820856" comment="glibc-headers-2.17-78.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820857" comment="glibc-static-2.17-78.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820858" comment="glibc-utils-2.17-78.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820859" comment="nscd-2.17-78.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:122" version="1" class="patch">
	<metadata>
		<title>security update for pcre (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0330.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0330.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8964">CVE-2014-8964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820860" comment="pcre-8.32-14.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820861" comment="pcre-devel-8.32-14.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820862" comment="pcre-static-8.32-14.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820863" comment="pcre-tools-8.32-14.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:123" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0349.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0349.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7815">CVE-2014-7815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7840">CVE-2014-7840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8106">CVE-2014-8106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820864" comment="libcacard-1.5.3-86.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820865" comment="libcacard-devel-1.5.3-86.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820866" comment="libcacard-tools-1.5.3-86.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820867" comment="qemu-img-1.5.3-86.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820868" comment="qemu-kvm-1.5.3-86.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820869" comment="qemu-kvm-common-1.5.3-86.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820870" comment="qemu-kvm-tools-1.5.3-86.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:124" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8105" ref_url="https://www.suse.com/security/cve/CVE-2014-8105/" source="CVE"/>
		<reference ref_id="CVE-2014-8112" ref_url="https://www.suse.com/security/cve/CVE-2014-8112/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0416.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0416.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8105/">CVE-2014-8105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8105">CVE-2014-8105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8112/">CVE-2014-8112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8112">CVE-2014-8112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820871" comment="389-ds-base-1.3.3.1-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820872" comment="389-ds-base-devel-1.3.3.1-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820873" comment="389-ds-base-libs-1.3.3.1-13.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:125" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-2653" ref_url="https://www.suse.com/security/cve/CVE-2014-2653/" source="CVE"/>
		<reference ref_id="CVE-2014-9278" ref_url="https://www.suse.com/security/cve/CVE-2014-9278/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0425.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0425.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2653/">CVE-2014-2653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2653">CVE-2014-2653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9278/">CVE-2014-9278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9278">CVE-2014-9278 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820874" comment="openssh-6.6.1p1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820875" comment="openssh-askpass-6.6.1p1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820876" comment="openssh-clients-6.6.1p1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820877" comment="openssh-keycat-6.6.1p1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820878" comment="openssh-ldap-6.6.1p1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820879" comment="openssh-server-6.6.1p1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820880" comment="openssh-server-sysvinit-6.6.1p1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820881" comment="pam_ssh_agent_auth-0.9.3-9.11.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:126" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341/" source="CVE"/>
		<reference ref_id="CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342/" source="CVE"/>
		<reference ref_id="CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343/" source="CVE"/>
		<reference ref_id="CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344/" source="CVE"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0439.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0439.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4341">CVE-2014-4341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4342">CVE-2014-4342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4343">CVE-2014-4343 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4344">CVE-2014-4344 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4345">CVE-2014-4345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5352">CVE-2014-5352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5353">CVE-2014-5353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9421">CVE-2014-9421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9422">CVE-2014-9422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9423">CVE-2014-9423 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820882" comment="krb5-devel-1.12.2-14.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820883" comment="krb5-libs-1.12.2-14.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820884" comment="krb5-pkinit-1.12.2-14.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820885" comment="krb5-server-1.12.2-14.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820886" comment="krb5-server-ldap-1.12.2-14.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820887" comment="krb5-workstation-1.12.2-14.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:127" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2010-5312" ref_url="https://www.suse.com/security/cve/CVE-2010-5312/" source="CVE"/>
		<reference ref_id="CVE-2012-6662" ref_url="https://www.suse.com/security/cve/CVE-2012-6662/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0442.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0442.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5312/">CVE-2010-5312 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-5312">CVE-2010-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6662/">CVE-2012-6662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6662">CVE-2012-6662 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820888" comment="ipa-admintools-4.1.0-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820889" comment="ipa-client-4.1.0-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820890" comment="ipa-python-4.1.0-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820891" comment="ipa-server-4.1.0-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820892" comment="ipa-server-trust-ad-4.1.0-18.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:128" version="1" class="patch">
	<metadata>
		<title>security update for clutter (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-7300" ref_url="https://www.suse.com/security/cve/CVE-2014-7300/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0535.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0535.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7300/">CVE-2014-7300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7300">CVE-2014-7300 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820893" comment="clutter-1.14.4-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820894" comment="clutter-devel-1.14.4-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820895" comment="clutter-doc-1.14.4-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820896" comment="cogl-1.14.0-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820897" comment="cogl-devel-1.14.0-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820898" comment="cogl-doc-1.14.0-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820899" comment="gnome-shell-3.8.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820900" comment="gnome-shell-browser-plugin-3.8.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820901" comment="mutter-3.8.4-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820902" comment="mutter-devel-3.8.4-16.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:129" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0642.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0642.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0822">CVE-2015-0822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0827">CVE-2015-0827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0831">CVE-2015-0831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0836">CVE-2015-0836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820903" comment="thunderbird-31.5.0-2.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:130" version="1" class="patch">
	<metadata>
		<title>security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0672.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0672.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1349">CVE-2015-1349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820904" comment="bind-9.9.4-18.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820905" comment="bind-chroot-9.9.4-18.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820906" comment="bind-devel-9.9.4-18.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820907" comment="bind-libs-9.9.4-18.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820908" comment="bind-libs-lite-9.9.4-18.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820909" comment="bind-license-9.9.4-18.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820910" comment="bind-lite-devel-9.9.4-18.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820911" comment="bind-sdb-9.9.4-18.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820912" comment="bind-sdb-chroot-9.9.4-18.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820913" comment="bind-utils-9.9.4-18.el7_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:131" version="1" class="patch">
	<metadata>
		<title>security update for freetype (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0696.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0696.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9657">CVE-2014-9657 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9658">CVE-2014-9658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9660">CVE-2014-9660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9661">CVE-2014-9661 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9663">CVE-2014-9663 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9664">CVE-2014-9664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9667">CVE-2014-9667 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9669">CVE-2014-9669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9670">CVE-2014-9670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9671">CVE-2014-9671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9673">CVE-2014-9673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9674">CVE-2014-9674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9675">CVE-2014-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820914" comment="freetype-2.4.11-10.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820915" comment="freetype-demos-2.4.11-10.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820916" comment="freetype-devel-2.4.11-10.el7_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:132" version="1" class="patch">
	<metadata>
		<title>security update for unzip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0700.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0700.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8139">CVE-2014-8139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8140">CVE-2014-8140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8141">CVE-2014-8141 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9636">CVE-2014-9636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820917" comment="unzip-6.0-15.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:133" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0292" ref_url="https://www.suse.com/security/cve/CVE-2015-0292/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0716.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0716.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0292/">CVE-2015-0292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0292">CVE-2015-0292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820918" comment="openssl-1.0.1e-42.el7_1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820919" comment="openssl-devel-1.0.1e-42.el7_1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820920" comment="openssl-libs-1.0.1e-42.el7_1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820921" comment="openssl-perl-1.0.1e-42.el7_1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820922" comment="openssl-static-1.0.1e-42.el7_1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:134" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0718.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0718.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0817">CVE-2015-0817 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0818">CVE-2015-0818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820923" comment="firefox-31.5.3-3.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:135" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8159" ref_url="https://www.suse.com/security/cve/CVE-2014-8159/" source="CVE"/>
		<reference ref_id="CVE-2015-1421" ref_url="https://www.suse.com/security/cve/CVE-2015-1421/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0726.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0726.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8159/">CVE-2014-8159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8159">CVE-2014-8159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1421/">CVE-2015-1421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1421">CVE-2015-1421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820924" comment="kernel-3.10.0-229.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820925" comment="kernel-abi-whitelists-3.10.0-229.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820926" comment="kernel-debug-3.10.0-229.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820929" comment="kernel-doc-3.10.0-229.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820930" comment="kernel-headers-3.10.0-229.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820931" comment="kernel-tools-3.10.0-229.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820932" comment="kernel-tools-libs-3.10.0-229.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820934" comment="perf-3.10.0-229.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820935" comment="python-perf-3.10.0-229.1.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:136" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0283" ref_url="https://www.suse.com/security/cve/CVE-2015-0283/" source="CVE"/>
		<reference ref_id="CVE-2015-1827" ref_url="https://www.suse.com/security/cve/CVE-2015-1827/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0728.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0728.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0283/">CVE-2015-0283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0283">CVE-2015-0283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1827/">CVE-2015-1827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1827">CVE-2015-1827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820936" comment="ipa-admintools-4.1.0-18.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820937" comment="ipa-client-4.1.0-18.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820938" comment="ipa-python-4.1.0-18.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820939" comment="ipa-server-4.1.0-18.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820940" comment="ipa-server-trust-ad-4.1.0-18.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820941" comment="slapi-nis-0.54-3.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:137" version="1" class="patch">
	<metadata>
		<title>security update for setroubleshoot (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-1815" ref_url="https://www.suse.com/security/cve/CVE-2015-1815/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0729.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0729.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1815/">CVE-2015-1815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1815">CVE-2015-1815 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820942" comment="setroubleshoot-3.2.17-4.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820943" comment="setroubleshoot-server-3.2.17-4.1.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:138" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0749.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0749.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820944" comment="libxml2-2.9.1-5.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820945" comment="libxml2-devel-2.9.1-5.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820946" comment="libxml2-python-2.9.1-5.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820947" comment="libxml2-static-2.9.1-5.el7_1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:139" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8161" ref_url="https://www.suse.com/security/cve/CVE-2014-8161/" source="CVE"/>
		<reference ref_id="CVE-2015-0241" ref_url="https://www.suse.com/security/cve/CVE-2015-0241/" source="CVE"/>
		<reference ref_id="CVE-2015-0243" ref_url="https://www.suse.com/security/cve/CVE-2015-0243/" source="CVE"/>
		<reference ref_id="CVE-2015-0244" ref_url="https://www.suse.com/security/cve/CVE-2015-0244/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0750.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0750.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8161/">CVE-2014-8161 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8161">CVE-2014-8161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0241/">CVE-2015-0241 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0241">CVE-2015-0241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0243/">CVE-2015-0243 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0243">CVE-2015-0243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0244/">CVE-2015-0244 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0244">CVE-2015-0244 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820948" comment="postgresql-9.2.10-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820949" comment="postgresql-contrib-9.2.10-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820950" comment="postgresql-devel-9.2.10-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820951" comment="postgresql-docs-9.2.10-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820952" comment="postgresql-libs-9.2.10-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820953" comment="postgresql-plperl-9.2.10-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820954" comment="postgresql-plpython-9.2.10-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820955" comment="postgresql-pltcl-9.2.10-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820956" comment="postgresql-server-9.2.10-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820957" comment="postgresql-test-9.2.10-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820958" comment="postgresql-upgrade-9.2.10-2.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:140" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0766.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0766.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0801">CVE-2015-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0807">CVE-2015-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0813">CVE-2015-0813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0815">CVE-2015-0815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0816">CVE-2015-0816 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820959" comment="firefox-31.6.0-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820960" comment="xulrunner-31.6.0-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820961" comment="xulrunner-devel-31.6.0-2.el7_1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820959" comment="firefox-31.6.0-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820960" comment="xulrunner-31.6.0-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820961" comment="xulrunner-devel-31.6.0-2.el7_1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:141" version="1" class="patch">
	<metadata>
		<title>security update for flac (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0767.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0767.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8962">CVE-2014-8962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9028">CVE-2014-9028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820962" comment="flac-1.3.0-5.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820963" comment="flac-devel-1.3.0-5.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820964" comment="flac-libs-1.3.0-5.el7_1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820962" comment="flac-1.3.0-5.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820963" comment="flac-devel-1.3.0-5.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820964" comment="flac-libs-1.3.0-5.el7_1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:142" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0771.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0771.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0801">CVE-2015-0801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0807">CVE-2015-0807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0813">CVE-2015-0813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0815">CVE-2015-0815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0816">CVE-2015-0816 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820965" comment="thunderbird-31.6.0-1.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:143" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0797.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0797.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0255">CVE-2015-0255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820966" comment="xorg-x11-server-Xdmx-1.15.0-33.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820967" comment="xorg-x11-server-Xephyr-1.15.0-33.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820968" comment="xorg-x11-server-Xnest-1.15.0-33.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820969" comment="xorg-x11-server-Xorg-1.15.0-33.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820970" comment="xorg-x11-server-Xvfb-1.15.0-33.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820971" comment="xorg-x11-server-common-1.15.0-33.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820972" comment="xorg-x11-server-devel-1.15.0-33.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820973" comment="xorg-x11-server-source-1.15.0-33.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:144" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2005-1080" ref_url="https://www.suse.com/security/cve/CVE-2005-1080/" source="CVE"/>
		<reference ref_id="CVE-2015-0460" ref_url="https://www.suse.com/security/cve/CVE-2015-0460/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0806.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0806.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-1080/">CVE-2005-1080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-1080">CVE-2005-1080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0460/">CVE-2015-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0460">CVE-2015-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820974" comment="java-1.7.0-openjdk-1.7.0.79-2.5.5.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820975" comment="java-1.7.0-openjdk-accessibility-1.7.0.79-2.5.5.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820976" comment="java-1.7.0-openjdk-demo-1.7.0.79-2.5.5.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820977" comment="java-1.7.0-openjdk-devel-1.7.0.79-2.5.5.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820978" comment="java-1.7.0-openjdk-headless-1.7.0.79-2.5.5.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820979" comment="java-1.7.0-openjdk-javadoc-1.7.0.79-2.5.5.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820980" comment="java-1.7.0-openjdk-src-1.7.0.79-2.5.5.1.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:145" version="1" class="patch">
	<metadata>
		<title>security update for java-1.6.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2005-1080" ref_url="https://www.suse.com/security/cve/CVE-2005-1080/" source="CVE"/>
		<reference ref_id="CVE-2015-0460" ref_url="https://www.suse.com/security/cve/CVE-2015-0460/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0808.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0808.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-1080/">CVE-2005-1080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-1080">CVE-2005-1080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0460/">CVE-2015-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0460">CVE-2015-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820981" comment="java-1.6.0-openjdk-1.6.0.35-1.13.7.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820982" comment="java-1.6.0-openjdk-demo-1.6.0.35-1.13.7.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820983" comment="java-1.6.0-openjdk-devel-1.6.0.35-1.13.7.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820984" comment="java-1.6.0-openjdk-javadoc-1.6.0.35-1.13.7.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820985" comment="java-1.6.0-openjdk-src-1.6.0.35-1.13.7.1.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:146" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2005-1080" ref_url="https://www.suse.com/security/cve/CVE-2005-1080/" source="CVE"/>
		<reference ref_id="CVE-2015-0460" ref_url="https://www.suse.com/security/cve/CVE-2015-0460/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0470" ref_url="https://www.suse.com/security/cve/CVE-2015-0470/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0809.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0809.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-1080/">CVE-2005-1080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-1080">CVE-2005-1080 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0460/">CVE-2015-0460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0460">CVE-2015-0460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0469">CVE-2015-0469 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0470/">CVE-2015-0470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0470">CVE-2015-0470 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0477">CVE-2015-0477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0478">CVE-2015-0478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0480">CVE-2015-0480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0488">CVE-2015-0488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820986" comment="java-1.8.0-openjdk-1.8.0.45-30.b13.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820987" comment="java-1.8.0-openjdk-accessibility-1.8.0.45-30.b13.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820988" comment="java-1.8.0-openjdk-demo-1.8.0.45-30.b13.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820989" comment="java-1.8.0-openjdk-devel-1.8.0.45-30.b13.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820990" comment="java-1.8.0-openjdk-headless-1.8.0.45-30.b13.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820991" comment="java-1.8.0-openjdk-javadoc-1.8.0.45-30.b13.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820992" comment="java-1.8.0-openjdk-src-1.8.0.45-30.b13.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-1854" ref_url="https://www.suse.com/security/cve/CVE-2015-1854/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0895.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0895.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1854/">CVE-2015-1854 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1854">CVE-2015-1854 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820993" comment="389-ds-base-1.3.3.1-16.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820994" comment="389-ds-base-devel-1.3.3.1-16.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820995" comment="389-ds-base-libs-1.3.3.1-16.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-1848" ref_url="https://www.suse.com/security/cve/CVE-2015-1848/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0980.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0980.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1848/">CVE-2015-1848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1848">CVE-2015-1848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820996" comment="pcs-0.9.137-13.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820997" comment="python-clufter-0.9.137-13.el7_1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0227" ref_url="https://www.suse.com/security/cve/CVE-2014-0227/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0983.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0983.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0227/">CVE-2014-0227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0227">CVE-2014-0227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820998" comment="tomcat-7.0.54-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820999" comment="tomcat-admin-webapps-7.0.54-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821000" comment="tomcat-docs-webapp-7.0.54-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821001" comment="tomcat-el-2.2-api-7.0.54-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821002" comment="tomcat-javadoc-7.0.54-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821003" comment="tomcat-jsp-2.2-api-7.0.54-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821004" comment="tomcat-jsvc-7.0.54-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821005" comment="tomcat-lib-7.0.54-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821006" comment="tomcat-servlet-3.0-api-7.0.54-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821007" comment="tomcat-webapps-7.0.54-2.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150" version="1" class="patch">
	<metadata>
		<title>security update for kexec-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0267" ref_url="https://www.suse.com/security/cve/CVE-2015-0267/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0986.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0986.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0267/">CVE-2015-0267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0267">CVE-2015-0267 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821008" comment="kexec-tools-2.0.7-19.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821009" comment="kexec-tools-anaconda-addon-2.0.7-19.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821010" comment="kexec-tools-eppic-2.0.7-19.el7_1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3331" ref_url="https://www.suse.com/security/cve/CVE-2015-3331/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0987.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0987.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3331/">CVE-2015-3331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3331">CVE-2015-3331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821011" comment="kernel-3.10.0-229.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821012" comment="kernel-abi-whitelists-3.10.0-229.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821013" comment="kernel-debug-3.10.0-229.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821016" comment="kernel-doc-3.10.0-229.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821017" comment="kernel-headers-3.10.0-229.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821018" comment="kernel-tools-3.10.0-229.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821019" comment="kernel-tools-libs-3.10.0-229.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821021" comment="perf-3.10.0-229.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821022" comment="python-perf-3.10.0-229.4.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0988.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0988.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0797">CVE-2015-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2708">CVE-2015-2708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2710">CVE-2015-2710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2713">CVE-2015-2713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2716">CVE-2015-2716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821023" comment="firefox-38.0-3.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:0999.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:0999.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821024" comment="libcacard-1.5.3-86.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821025" comment="libcacard-devel-1.5.3-86.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821026" comment="libcacard-tools-1.5.3-86.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821027" comment="qemu-img-1.5.3-86.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821028" comment="qemu-kvm-1.5.3-86.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821029" comment="qemu-kvm-common-1.5.3-86.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821030" comment="qemu-kvm-tools-1.5.3-86.el7_1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:154" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1012.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1012.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2708">CVE-2015-2708 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2710">CVE-2015-2710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2713">CVE-2015-2713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2716">CVE-2015-2716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821031" comment="thunderbird-31.7.0-1.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:155" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1072.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1072.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821032" comment="openssl-1.0.1e-42.el7_1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821033" comment="openssl-devel-1.0.1e-42.el7_1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821034" comment="openssl-libs-1.0.1e-42.el7_1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821035" comment="openssl-perl-1.0.1e-42.el7_1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821036" comment="openssl-static-1.0.1e-42.el7_1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:156" version="1" class="patch">
	<metadata>
		<title>security update for abrt (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-1869" ref_url="https://www.suse.com/security/cve/CVE-2015-1869/" source="CVE"/>
		<reference ref_id="CVE-2015-1870" ref_url="https://www.suse.com/security/cve/CVE-2015-1870/" source="CVE"/>
		<reference ref_id="CVE-2015-3142" ref_url="https://www.suse.com/security/cve/CVE-2015-3142/" source="CVE"/>
		<reference ref_id="CVE-2015-3147" ref_url="https://www.suse.com/security/cve/CVE-2015-3147/" source="CVE"/>
		<reference ref_id="CVE-2015-3150" ref_url="https://www.suse.com/security/cve/CVE-2015-3150/" source="CVE"/>
		<reference ref_id="CVE-2015-3151" ref_url="https://www.suse.com/security/cve/CVE-2015-3151/" source="CVE"/>
		<reference ref_id="CVE-2015-3159" ref_url="https://www.suse.com/security/cve/CVE-2015-3159/" source="CVE"/>
		<reference ref_id="CVE-2015-3315" ref_url="https://www.suse.com/security/cve/CVE-2015-3315/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1083.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1083.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1869/">CVE-2015-1869 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1869">CVE-2015-1869 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1870/">CVE-2015-1870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1870">CVE-2015-1870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3142/">CVE-2015-3142 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3142">CVE-2015-3142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3147/">CVE-2015-3147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3147">CVE-2015-3147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3150/">CVE-2015-3150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3150">CVE-2015-3150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3151/">CVE-2015-3151 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3151">CVE-2015-3151 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3159/">CVE-2015-3159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3159">CVE-2015-3159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3315/">CVE-2015-3315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3315">CVE-2015-3315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821037" comment="abrt-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821038" comment="abrt-addon-ccpp-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821039" comment="abrt-addon-kerneloops-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821040" comment="abrt-addon-pstoreoops-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821041" comment="abrt-addon-python-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821042" comment="abrt-addon-upload-watch-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821043" comment="abrt-addon-vmcore-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821044" comment="abrt-addon-xorg-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821045" comment="abrt-cli-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821046" comment="abrt-console-notification-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821047" comment="abrt-dbus-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821048" comment="abrt-desktop-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821049" comment="abrt-devel-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821050" comment="abrt-gui-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821051" comment="abrt-gui-devel-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821052" comment="abrt-gui-libs-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821053" comment="abrt-libs-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821054" comment="abrt-python-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821055" comment="abrt-python-doc-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821056" comment="abrt-retrace-client-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821057" comment="abrt-tui-2.1.11-22.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821058" comment="libreport-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821059" comment="libreport-anaconda-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821060" comment="libreport-cli-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821061" comment="libreport-compat-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821062" comment="libreport-devel-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821063" comment="libreport-filesystem-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821064" comment="libreport-gtk-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821065" comment="libreport-gtk-devel-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821066" comment="libreport-newt-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821067" comment="libreport-plugin-bugzilla-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821068" comment="libreport-plugin-kerneloops-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821069" comment="libreport-plugin-logger-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821070" comment="libreport-plugin-mailx-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821071" comment="libreport-plugin-reportuploader-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821072" comment="libreport-plugin-ureport-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821073" comment="libreport-python-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821074" comment="libreport-web-2.1.11-23.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821075" comment="libreport-web-devel-2.1.11-23.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:157" version="1" class="patch">
	<metadata>
		<title>security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1090.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1090.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1863">CVE-2015-1863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4142">CVE-2015-4142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821076" comment="wpa_supplicant-2.0-17.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:158" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8176" ref_url="https://www.suse.com/security/cve/CVE-2014-8176/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1115.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1115.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8176/">CVE-2014-8176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8176">CVE-2014-8176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1791">CVE-2015-1791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1792">CVE-2015-1792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3216">CVE-2015-3216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821077" comment="openssl-1.0.1e-42.el7_1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821078" comment="openssl-devel-1.0.1e-42.el7_1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821079" comment="openssl-libs-1.0.1e-42.el7_1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821080" comment="openssl-perl-1.0.1e-42.el7_1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821081" comment="openssl-static-1.0.1e-42.el7_1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:159" version="1" class="patch">
	<metadata>
		<title>security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679/" source="CVE"/>
		<reference ref_id="CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158/" source="CVE"/>
		<reference ref_id="CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1123.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1123.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9679">CVE-2014-9679 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1158">CVE-2015-1158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1159">CVE-2015-1159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821082" comment="cups-1.6.3-17.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821083" comment="cups-client-1.6.3-17.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821084" comment="cups-devel-1.6.3-17.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821085" comment="cups-filesystem-1.6.3-17.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821086" comment="cups-ipptool-1.6.3-17.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821087" comment="cups-libs-1.6.3-17.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821088" comment="cups-lpd-1.6.3-17.el7_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:160" version="1" class="patch">
	<metadata>
		<title>security update for php (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8142" ref_url="https://www.suse.com/security/cve/CVE-2014-8142/" source="CVE"/>
		<reference ref_id="CVE-2014-9652" ref_url="https://www.suse.com/security/cve/CVE-2014-9652/" source="CVE"/>
		<reference ref_id="CVE-2014-9705" ref_url="https://www.suse.com/security/cve/CVE-2014-9705/" source="CVE"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="CVE-2015-0231" ref_url="https://www.suse.com/security/cve/CVE-2015-0231/" source="CVE"/>
		<reference ref_id="CVE-2015-0232" ref_url="https://www.suse.com/security/cve/CVE-2015-0232/" source="CVE"/>
		<reference ref_id="CVE-2015-0273" ref_url="https://www.suse.com/security/cve/CVE-2015-0273/" source="CVE"/>
		<reference ref_id="CVE-2015-2301" ref_url="https://www.suse.com/security/cve/CVE-2015-2301/" source="CVE"/>
		<reference ref_id="CVE-2015-2348" ref_url="https://www.suse.com/security/cve/CVE-2015-2348/" source="CVE"/>
		<reference ref_id="CVE-2015-2783" ref_url="https://www.suse.com/security/cve/CVE-2015-2783/" source="CVE"/>
		<reference ref_id="CVE-2015-2787" ref_url="https://www.suse.com/security/cve/CVE-2015-2787/" source="CVE"/>
		<reference ref_id="CVE-2015-3307" ref_url="https://www.suse.com/security/cve/CVE-2015-3307/" source="CVE"/>
		<reference ref_id="CVE-2015-3329" ref_url="https://www.suse.com/security/cve/CVE-2015-3329/" source="CVE"/>
		<reference ref_id="CVE-2015-3330" ref_url="https://www.suse.com/security/cve/CVE-2015-3330/" source="CVE"/>
		<reference ref_id="CVE-2015-3411" ref_url="https://www.suse.com/security/cve/CVE-2015-3411/" source="CVE"/>
		<reference ref_id="CVE-2015-3412" ref_url="https://www.suse.com/security/cve/CVE-2015-3412/" source="CVE"/>
		<reference ref_id="CVE-2015-4021" ref_url="https://www.suse.com/security/cve/CVE-2015-4021/" source="CVE"/>
		<reference ref_id="CVE-2015-4022" ref_url="https://www.suse.com/security/cve/CVE-2015-4022/" source="CVE"/>
		<reference ref_id="CVE-2015-4024" ref_url="https://www.suse.com/security/cve/CVE-2015-4024/" source="CVE"/>
		<reference ref_id="CVE-2015-4025" ref_url="https://www.suse.com/security/cve/CVE-2015-4025/" source="CVE"/>
		<reference ref_id="CVE-2015-4026" ref_url="https://www.suse.com/security/cve/CVE-2015-4026/" source="CVE"/>
		<reference ref_id="CVE-2015-4147" ref_url="https://www.suse.com/security/cve/CVE-2015-4147/" source="CVE"/>
		<reference ref_id="CVE-2015-4148" ref_url="https://www.suse.com/security/cve/CVE-2015-4148/" source="CVE"/>
		<reference ref_id="CVE-2015-4598" ref_url="https://www.suse.com/security/cve/CVE-2015-4598/" source="CVE"/>
		<reference ref_id="CVE-2015-4599" ref_url="https://www.suse.com/security/cve/CVE-2015-4599/" source="CVE"/>
		<reference ref_id="CVE-2015-4600" ref_url="https://www.suse.com/security/cve/CVE-2015-4600/" source="CVE"/>
		<reference ref_id="CVE-2015-4601" ref_url="https://www.suse.com/security/cve/CVE-2015-4601/" source="CVE"/>
		<reference ref_id="CVE-2015-4602" ref_url="https://www.suse.com/security/cve/CVE-2015-4602/" source="CVE"/>
		<reference ref_id="CVE-2015-4603" ref_url="https://www.suse.com/security/cve/CVE-2015-4603/" source="CVE"/>
		<reference ref_id="CVE-2015-4604" ref_url="https://www.suse.com/security/cve/CVE-2015-4604/" source="CVE"/>
		<reference ref_id="CVE-2015-4605" ref_url="https://www.suse.com/security/cve/CVE-2015-4605/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1135.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1135.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8142/">CVE-2014-8142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8142">CVE-2014-8142 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9652/">CVE-2014-9652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9652">CVE-2014-9652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9705/">CVE-2014-9705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9705">CVE-2014-9705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9709">CVE-2014-9709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0231/">CVE-2015-0231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0231">CVE-2015-0231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0232/">CVE-2015-0232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0232">CVE-2015-0232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0273/">CVE-2015-0273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0273">CVE-2015-0273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2301/">CVE-2015-2301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2301">CVE-2015-2301 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2348/">CVE-2015-2348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2348">CVE-2015-2348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2783/">CVE-2015-2783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2783">CVE-2015-2783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2787/">CVE-2015-2787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2787">CVE-2015-2787 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3307/">CVE-2015-3307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3307">CVE-2015-3307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3329/">CVE-2015-3329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3329">CVE-2015-3329 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3330/">CVE-2015-3330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3330">CVE-2015-3330 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3411/">CVE-2015-3411 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3411">CVE-2015-3411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3412/">CVE-2015-3412 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3412">CVE-2015-3412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4021/">CVE-2015-4021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4021">CVE-2015-4021 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4022/">CVE-2015-4022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4022">CVE-2015-4022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4024/">CVE-2015-4024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4024">CVE-2015-4024 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-4025/">CVE-2015-4025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4025">CVE-2015-4025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4026/">CVE-2015-4026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4026">CVE-2015-4026 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4147/">CVE-2015-4147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4147">CVE-2015-4147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4148/">CVE-2015-4148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4148">CVE-2015-4148 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4598/">CVE-2015-4598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4598">CVE-2015-4598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4599/">CVE-2015-4599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4599">CVE-2015-4599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4600/">CVE-2015-4600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4600">CVE-2015-4600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4601/">CVE-2015-4601 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4601">CVE-2015-4601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4602/">CVE-2015-4602 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4602">CVE-2015-4602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4603/">CVE-2015-4603 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4603">CVE-2015-4603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4604/">CVE-2015-4604 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4604">CVE-2015-4604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4605/">CVE-2015-4605 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4605">CVE-2015-4605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821089" comment="php-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821090" comment="php-bcmath-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821091" comment="php-cli-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821092" comment="php-common-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821093" comment="php-dba-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821094" comment="php-devel-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821095" comment="php-embedded-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821096" comment="php-enchant-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821097" comment="php-fpm-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821098" comment="php-gd-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821099" comment="php-intl-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821100" comment="php-ldap-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821101" comment="php-mbstring-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821102" comment="php-mysql-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821103" comment="php-mysqlnd-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821104" comment="php-odbc-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821105" comment="php-pdo-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821106" comment="php-pgsql-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821107" comment="php-process-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821108" comment="php-pspell-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821109" comment="php-recode-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821110" comment="php-snmp-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821111" comment="php-soap-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821112" comment="php-xml-5.4.16-36.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821113" comment="php-xmlrpc-5.4.16-36.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:161" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-9420" ref_url="https://www.suse.com/security/cve/CVE-2014-9420/" source="CVE"/>
		<reference ref_id="CVE-2014-9529" ref_url="https://www.suse.com/security/cve/CVE-2014-9529/" source="CVE"/>
		<reference ref_id="CVE-2014-9584" ref_url="https://www.suse.com/security/cve/CVE-2014-9584/" source="CVE"/>
		<reference ref_id="CVE-2015-1573" ref_url="https://www.suse.com/security/cve/CVE-2015-1573/" source="CVE"/>
		<reference ref_id="CVE-2015-1593" ref_url="https://www.suse.com/security/cve/CVE-2015-1593/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1137.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1137.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9420/">CVE-2014-9420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9420">CVE-2014-9420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9529/">CVE-2014-9529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9529">CVE-2014-9529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9584/">CVE-2014-9584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9584">CVE-2014-9584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1573/">CVE-2015-1573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1573">CVE-2015-1573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1593/">CVE-2015-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1593">CVE-2015-1593 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1805">CVE-2015-1805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2830">CVE-2015-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821114" comment="kernel-3.10.0-229.7.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821115" comment="kernel-abi-whitelists-3.10.0-229.7.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821116" comment="kernel-debug-3.10.0-229.7.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821119" comment="kernel-doc-3.10.0-229.7.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821120" comment="kernel-headers-3.10.0-229.7.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821121" comment="kernel-tools-3.10.0-229.7.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821122" comment="kernel-tools-libs-3.10.0-229.7.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821124" comment="perf-3.10.0-229.7.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821125" comment="python-perf-3.10.0-229.7.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:162" version="1" class="patch">
	<metadata>
		<title>security update for mailman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1153.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1153.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2775">CVE-2015-2775 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821126" comment="mailman-2.1.15-21.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:163" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3204" ref_url="https://www.suse.com/security/cve/CVE-2015-3204/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1154.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1154.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3204/">CVE-2015-3204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3204">CVE-2015-3204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821127" comment="libreswan-3.12-10.1.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:164" version="1" class="patch">
	<metadata>
		<title>security update for nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1185.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1185.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821128" comment="nss-3.19.1-3.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821129" comment="nss-devel-3.19.1-3.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821130" comment="nss-pkcs11-devel-3.19.1-3.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821131" comment="nss-sysinit-3.19.1-3.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821132" comment="nss-tools-3.19.1-3.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821133" comment="nss-util-3.19.1-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821134" comment="nss-util-devel-3.19.1-1.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:165" version="1" class="patch">
	<metadata>
		<title>security update for xerces-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0252" ref_url="https://www.suse.com/security/cve/CVE-2015-0252/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1193.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1193.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0252/">CVE-2015-0252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0252">CVE-2015-0252 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821135" comment="xerces-c-3.1.1-7.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821136" comment="xerces-c-devel-3.1.1-7.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821137" comment="xerces-c-doc-3.1.1-7.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:166" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1194.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1194.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3165">CVE-2015-3165 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3166">CVE-2015-3166 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3167">CVE-2015-3167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821138" comment="postgresql-9.2.13-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821139" comment="postgresql-contrib-9.2.13-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821140" comment="postgresql-devel-9.2.13-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821141" comment="postgresql-docs-9.2.13-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821142" comment="postgresql-libs-9.2.13-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821143" comment="postgresql-plperl-9.2.13-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821144" comment="postgresql-plpython-9.2.13-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821145" comment="postgresql-pltcl-9.2.13-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821146" comment="postgresql-server-9.2.13-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821147" comment="postgresql-test-9.2.13-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821148" comment="postgresql-upgrade-9.2.13-1.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:167" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2727" ref_url="https://www.suse.com/security/cve/CVE-2015-2727/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2729" ref_url="https://www.suse.com/security/cve/CVE-2015-2729/" source="CVE"/>
		<reference ref_id="CVE-2015-2731" ref_url="https://www.suse.com/security/cve/CVE-2015-2731/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2741" ref_url="https://www.suse.com/security/cve/CVE-2015-2741/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1207.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1207.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2722">CVE-2015-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2724">CVE-2015-2724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2725">CVE-2015-2725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2727/">CVE-2015-2727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2727">CVE-2015-2727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2728">CVE-2015-2728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2729/">CVE-2015-2729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2729">CVE-2015-2729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2731/">CVE-2015-2731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2731">CVE-2015-2731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2733">CVE-2015-2733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2734">CVE-2015-2734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2735">CVE-2015-2735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2736">CVE-2015-2736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2737">CVE-2015-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2738">CVE-2015-2738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2739">CVE-2015-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2740">CVE-2015-2740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2741/">CVE-2015-2741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2741">CVE-2015-2741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2743">CVE-2015-2743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821149" comment="firefox-38.1.0-1.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:168" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2659" ref_url="https://www.suse.com/security/cve/CVE-2015-2659/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-3149" ref_url="https://www.suse.com/security/cve/CVE-2015-3149/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1228.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1228.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2628">CVE-2015-2628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2659/">CVE-2015-2659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2659">CVE-2015-2659 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3149/">CVE-2015-3149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3149">CVE-2015-3149 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821150" comment="java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821151" comment="java-1.8.0-openjdk-accessibility-1.8.0.51-1.b16.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821152" comment="java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821153" comment="java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821154" comment="java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821155" comment="java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821156" comment="java-1.8.0-openjdk-src-1.8.0.51-1.b16.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:169" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1229.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1229.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2628">CVE-2015-2628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821157" comment="java-1.7.0-openjdk-1.7.0.85-2.6.1.2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821158" comment="java-1.7.0-openjdk-accessibility-1.7.0.85-2.6.1.2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821159" comment="java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821160" comment="java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821161" comment="java-1.7.0-openjdk-headless-1.7.0.85-2.6.1.2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821162" comment="java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821163" comment="java-1.7.0-openjdk-src-1.7.0.85-2.6.1.2.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:170" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1443.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1443.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4620">CVE-2015-4620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821164" comment="bind-9.9.4-18.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821165" comment="bind-chroot-9.9.4-18.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821166" comment="bind-devel-9.9.4-18.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821167" comment="bind-libs-9.9.4-18.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821168" comment="bind-libs-lite-9.9.4-18.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821169" comment="bind-license-9.9.4-18.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821170" comment="bind-lite-devel-9.9.4-18.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821171" comment="bind-sdb-9.9.4-18.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821172" comment="bind-sdb-chroot-9.9.4-18.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821173" comment="bind-utils-9.9.4-18.el7_1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:171" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2731" ref_url="https://www.suse.com/security/cve/CVE-2015-2731/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2741" ref_url="https://www.suse.com/security/cve/CVE-2015-2741/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1455.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1455.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2724">CVE-2015-2724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2725">CVE-2015-2725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2731/">CVE-2015-2731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2731">CVE-2015-2731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2734">CVE-2015-2734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2735">CVE-2015-2735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2736">CVE-2015-2736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2737">CVE-2015-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2738">CVE-2015-2738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2739">CVE-2015-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2740">CVE-2015-2740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2741/">CVE-2015-2741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2741">CVE-2015-2741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821174" comment="thunderbird-31.8.0-1.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:172" version="1" class="patch">
	<metadata>
		<title>security update for libuser (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3245" ref_url="https://www.suse.com/security/cve/CVE-2015-3245/" source="CVE"/>
		<reference ref_id="CVE-2015-3246" ref_url="https://www.suse.com/security/cve/CVE-2015-3246/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1483.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1483.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3245/">CVE-2015-3245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3245">CVE-2015-3245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3246/">CVE-2015-3246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3246">CVE-2015-3246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821175" comment="libuser-0.60-7.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821176" comment="libuser-devel-0.60-7.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821177" comment="libuser-python-0.60-7.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:173" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3214" ref_url="https://www.suse.com/security/cve/CVE-2015-3214/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1507.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1507.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3214/">CVE-2015-3214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3214">CVE-2015-3214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821178" comment="libcacard-1.5.3-86.el7_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821179" comment="libcacard-devel-1.5.3-86.el7_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821180" comment="libcacard-tools-1.5.3-86.el7_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821181" comment="qemu-img-1.5.3-86.el7_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821182" comment="qemu-kvm-1.5.3-86.el7_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821183" comment="qemu-kvm-common-1.5.3-86.el7_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821184" comment="qemu-kvm-tools-1.5.3-86.el7_1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:174" version="1" class="patch">
	<metadata>
		<title>security update for clutter (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3213" ref_url="https://www.suse.com/security/cve/CVE-2015-3213/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1510.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1510.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3213/">CVE-2015-3213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3213">CVE-2015-3213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821185" comment="clutter-1.14.4-12.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821186" comment="clutter-devel-1.14.4-12.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821187" comment="clutter-doc-1.14.4-12.el7_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:175" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1513.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1513.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5477">CVE-2015-5477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821188" comment="bind-9.9.4-18.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821189" comment="bind-chroot-9.9.4-18.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821190" comment="bind-devel-9.9.4-18.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821191" comment="bind-libs-9.9.4-18.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821192" comment="bind-libs-lite-9.9.4-18.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821193" comment="bind-license-9.9.4-18.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821194" comment="bind-lite-devel-9.9.4-18.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821195" comment="bind-sdb-9.9.4-18.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821196" comment="bind-sdb-chroot-9.9.4-18.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821197" comment="bind-utils-9.9.4-18.el7_1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:176" version="1" class="patch">
	<metadata>
		<title>security update for java-1.6.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1526.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1526.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2590">CVE-2015-2590 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2601">CVE-2015-2601 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2621">CVE-2015-2621 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2625">CVE-2015-2625 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2628">CVE-2015-2628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2632">CVE-2015-2632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2808">CVE-2015-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4731">CVE-2015-4731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4732">CVE-2015-4732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4733">CVE-2015-4733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4748">CVE-2015-4748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4749">CVE-2015-4749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4760">CVE-2015-4760 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821198" comment="java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821199" comment="java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821200" comment="java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821201" comment="java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821202" comment="java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:177" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-9715" ref_url="https://www.suse.com/security/cve/CVE-2014-9715/" source="CVE"/>
		<reference ref_id="CVE-2015-2666" ref_url="https://www.suse.com/security/cve/CVE-2015-2666/" source="CVE"/>
		<reference ref_id="CVE-2015-2922" ref_url="https://www.suse.com/security/cve/CVE-2015-2922/" source="CVE"/>
		<reference ref_id="CVE-2015-3636" ref_url="https://www.suse.com/security/cve/CVE-2015-3636/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1534.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1534.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9715/">CVE-2014-9715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9715">CVE-2014-9715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2666/">CVE-2015-2666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2666">CVE-2015-2666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2922/">CVE-2015-2922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2922">CVE-2015-2922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3636/">CVE-2015-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3636">CVE-2015-3636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821203" comment="kernel-3.10.0-229.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821204" comment="kernel-abi-whitelists-3.10.0-229.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821205" comment="kernel-debug-3.10.0-229.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821208" comment="kernel-doc-3.10.0-229.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821209" comment="kernel-headers-3.10.0-229.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821210" comment="kernel-tools-3.10.0-229.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821211" comment="kernel-tools-libs-3.10.0-229.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821213" comment="perf-3.10.0-229.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821214" comment="python-perf-3.10.0-229.11.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:178" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1581.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1581.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4495">CVE-2015-4495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821215" comment="firefox-38.1.1-1.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:179" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4480" ref_url="https://www.suse.com/security/cve/CVE-2015-4480/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4493" ref_url="https://www.suse.com/security/cve/CVE-2015-4493/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1586.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1586.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4473">CVE-2015-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4475">CVE-2015-4475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4478">CVE-2015-4478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4479">CVE-2015-4479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4480/">CVE-2015-4480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4480">CVE-2015-4480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4484">CVE-2015-4484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4485">CVE-2015-4485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4486">CVE-2015-4486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4487">CVE-2015-4487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4488">CVE-2015-4488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4489">CVE-2015-4489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4492">CVE-2015-4492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4493/">CVE-2015-4493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4493">CVE-2015-4493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821216" comment="firefox-38.2.0-4.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:180" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2015-3416" ref_url="https://www.suse.com/security/cve/CVE-2015-3416/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1635.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1635.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3414">CVE-2015-3414 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3415">CVE-2015-3415 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3416/">CVE-2015-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3416">CVE-2015-3416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821217" comment="lemon-3.7.17-6.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821218" comment="sqlite-3.7.17-6.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821219" comment="sqlite-devel-3.7.17-6.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821220" comment="sqlite-doc-3.7.17-6.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821221" comment="sqlite-tcl-3.7.17-6.el7_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:181" version="1" class="patch">
	<metadata>
		<title>security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1636.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1636.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5621">CVE-2015-5621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821222" comment="net-snmp-5.7.2-20.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821223" comment="net-snmp-agent-libs-5.7.2-20.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821224" comment="net-snmp-devel-5.7.2-20.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821225" comment="net-snmp-gui-5.7.2-20.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821226" comment="net-snmp-libs-5.7.2-20.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821227" comment="net-snmp-perl-5.7.2-20.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821228" comment="net-snmp-python-5.7.2-20.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821229" comment="net-snmp-sysvinit-5.7.2-20.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821230" comment="net-snmp-utils-5.7.2-20.el7_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:182" version="1" class="patch">
	<metadata>
		<title>security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1640.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1640.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3238">CVE-2015-3238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821231" comment="pam-1.1.8-12.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821232" comment="pam-devel-1.1.8-12.el7_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:183" version="1" class="patch">
	<metadata>
		<title>security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433/" source="CVE"/>
		<reference ref_id="CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441/" source="CVE"/>
		<reference ref_id="CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499/" source="CVE"/>
		<reference ref_id="CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501/" source="CVE"/>
		<reference ref_id="CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505/" source="CVE"/>
		<reference ref_id="CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568/" source="CVE"/>
		<reference ref_id="CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571/" source="CVE"/>
		<reference ref_id="CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573/" source="CVE"/>
		<reference ref_id="CVE-2015-2582" ref_url="https://www.suse.com/security/cve/CVE-2015-2582/" source="CVE"/>
		<reference ref_id="CVE-2015-2620" ref_url="https://www.suse.com/security/cve/CVE-2015-2620/" source="CVE"/>
		<reference ref_id="CVE-2015-2643" ref_url="https://www.suse.com/security/cve/CVE-2015-2643/" source="CVE"/>
		<reference ref_id="CVE-2015-2648" ref_url="https://www.suse.com/security/cve/CVE-2015-2648/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4737" ref_url="https://www.suse.com/security/cve/CVE-2015-4737/" source="CVE"/>
		<reference ref_id="CVE-2015-4752" ref_url="https://www.suse.com/security/cve/CVE-2015-4752/" source="CVE"/>
		<reference ref_id="CVE-2015-4757" ref_url="https://www.suse.com/security/cve/CVE-2015-4757/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1665.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1665.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0433">CVE-2015-0433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0441">CVE-2015-0441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0499">CVE-2015-0499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0501">CVE-2015-0501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0505">CVE-2015-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2568">CVE-2015-2568 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2571">CVE-2015-2571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2573">CVE-2015-2573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2582/">CVE-2015-2582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2582">CVE-2015-2582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2620/">CVE-2015-2620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2620">CVE-2015-2620 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2643/">CVE-2015-2643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2643">CVE-2015-2643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2648/">CVE-2015-2648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2648">CVE-2015-2648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3152">CVE-2015-3152 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4737/">CVE-2015-4737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4737">CVE-2015-4737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4752/">CVE-2015-4752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4752">CVE-2015-4752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4757/">CVE-2015-4757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4757">CVE-2015-4757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821233" comment="mariadb-5.5.44-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821234" comment="mariadb-bench-5.5.44-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821235" comment="mariadb-devel-5.5.44-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821236" comment="mariadb-embedded-5.5.44-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821237" comment="mariadb-embedded-devel-5.5.44-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821238" comment="mariadb-libs-5.5.44-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821239" comment="mariadb-server-5.5.44-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821240" comment="mariadb-test-5.5.44-1.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:184" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3183" ref_url="https://www.suse.com/security/cve/CVE-2015-3183/" source="CVE"/>
		<reference ref_id="CVE-2015-3185" ref_url="https://www.suse.com/security/cve/CVE-2015-3185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1667.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1667.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3183/">CVE-2015-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3183">CVE-2015-3183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3185/">CVE-2015-3185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3185">CVE-2015-3185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821241" comment="httpd-2.4.6-31.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821242" comment="httpd-devel-2.4.6-31.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821243" comment="httpd-manual-2.4.6-31.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821244" comment="httpd-tools-2.4.6-31.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821245" comment="mod_ldap-2.4.6-31.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821246" comment="mod_proxy_html-2.4.6-31.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821247" comment="mod_session-2.4.6-31.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821248" comment="mod_ssl-2.4.6-31.el7_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:185" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1682.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1682.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4473">CVE-2015-4473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4487">CVE-2015-4487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4488">CVE-2015-4488 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4489">CVE-2015-4489 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821249" comment="thunderbird-38.2.0-1.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:186" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1693.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1693.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4497">CVE-2015-4497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4498">CVE-2015-4498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821250" comment="firefox-38.2.1-1.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:187" version="1" class="patch">
	<metadata>
		<title>security update for gdk-pixbuf2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1694.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1694.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4491">CVE-2015-4491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821251" comment="gdk-pixbuf2-2.28.2-5.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821252" comment="gdk-pixbuf2-devel-2.28.2-5.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:188" version="1" class="patch">
	<metadata>
		<title>security update for jakarta-taglibs-standard (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2015-0254" ref_url="https://www.suse.com/security/cve/CVE-2015-0254/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1695.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1695.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0254/">CVE-2015-0254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0254">CVE-2015-0254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821253" comment="jakarta-taglibs-standard-1.1.2-14.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821254" comment="jakarta-taglibs-standard-javadoc-1.1.2-14.el7_1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821253" comment="jakarta-taglibs-standard-1.1.2-14.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821254" comment="jakarta-taglibs-standard-javadoc-1.1.2-14.el7_1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:189" version="1" class="patch">
	<metadata>
		<title>security update for nss-softokn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1699.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1699.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2730">CVE-2015-2730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821255" comment="nss-softokn-3.16.2.3-13.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821256" comment="nss-softokn-devel-3.16.2.3-13.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821257" comment="nss-softokn-freebl-3.16.2.3-13.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821258" comment="nss-softokn-freebl-devel-3.16.2.3-13.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:190" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5189" ref_url="https://www.suse.com/security/cve/CVE-2015-5189/" source="CVE"/>
		<reference ref_id="CVE-2015-5190" ref_url="https://www.suse.com/security/cve/CVE-2015-5190/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1700.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1700.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5189/">CVE-2015-5189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5189">CVE-2015-5189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5190/">CVE-2015-5190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5190">CVE-2015-5190 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821259" comment="pcs-0.9.137-13.el7_1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821260" comment="python-clufter-0.9.137-13.el7_1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:191" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1705.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1705.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5722">CVE-2015-5722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821261" comment="bind-9.9.4-18.el7_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821262" comment="bind-chroot-9.9.4-18.el7_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821263" comment="bind-devel-9.9.4-18.el7_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821264" comment="bind-libs-9.9.4-18.el7_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821265" comment="bind-libs-lite-9.9.4-18.el7_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821266" comment="bind-license-9.9.4-18.el7_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821267" comment="bind-lite-devel-9.9.4-18.el7_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821268" comment="bind-sdb-9.9.4-18.el7_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821269" comment="bind-sdb-chroot-9.9.4-18.el7_1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821270" comment="bind-utils-9.9.4-18.el7_1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:192" version="1" class="patch">
	<metadata>
		<title>security update for libXfont (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1708.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1708.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1802">CVE-2015-1802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1803">CVE-2015-1803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1804">CVE-2015-1804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821271" comment="libXfont-1.4.7-3.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821272" comment="libXfont-devel-1.4.7-3.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:193" version="1" class="patch">
	<metadata>
		<title>security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1714.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1714.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3247">CVE-2015-3247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821273" comment="spice-server-0.12.4-9.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821274" comment="spice-server-devel-0.12.4-9.el7_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:194" version="1" class="patch">
	<metadata>
		<title>security update for haproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3281" ref_url="https://www.suse.com/security/cve/CVE-2015-3281/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1741.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1741.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3281/">CVE-2015-3281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3281">CVE-2015-3281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821275" comment="haproxy-1.5.4-4.el7_1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:195" version="1" class="patch">
	<metadata>
		<title>security update for subversion (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0248" ref_url="https://www.suse.com/security/cve/CVE-2015-0248/" source="CVE"/>
		<reference ref_id="CVE-2015-0251" ref_url="https://www.suse.com/security/cve/CVE-2015-0251/" source="CVE"/>
		<reference ref_id="CVE-2015-3184" ref_url="https://www.suse.com/security/cve/CVE-2015-3184/" source="CVE"/>
		<reference ref_id="CVE-2015-3187" ref_url="https://www.suse.com/security/cve/CVE-2015-3187/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1742.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1742.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0248/">CVE-2015-0248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0248">CVE-2015-0248 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0251/">CVE-2015-0251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0251">CVE-2015-0251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3184/">CVE-2015-3184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3184">CVE-2015-3184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3187/">CVE-2015-3187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3187">CVE-2015-3187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821276" comment="mod_dav_svn-1.7.14-7.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821277" comment="subversion-1.7.14-7.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821278" comment="subversion-devel-1.7.14-7.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821279" comment="subversion-gnome-1.7.14-7.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821280" comment="subversion-javahl-1.7.14-7.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821281" comment="subversion-kde-1.7.14-7.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821282" comment="subversion-libs-1.7.14-7.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821283" comment="subversion-perl-1.7.14-7.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821284" comment="subversion-python-1.7.14-7.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821285" comment="subversion-ruby-1.7.14-7.el7_1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821286" comment="subversion-tools-1.7.14-7.el7_1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:196" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-9585" ref_url="https://www.suse.com/security/cve/CVE-2014-9585/" source="CVE"/>
		<reference ref_id="CVE-2015-0275" ref_url="https://www.suse.com/security/cve/CVE-2015-0275/" source="CVE"/>
		<reference ref_id="CVE-2015-1333" ref_url="https://www.suse.com/security/cve/CVE-2015-1333/" source="CVE"/>
		<reference ref_id="CVE-2015-3212" ref_url="https://www.suse.com/security/cve/CVE-2015-3212/" source="CVE"/>
		<reference ref_id="CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1778.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1778.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9585/">CVE-2014-9585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9585">CVE-2014-9585 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0275/">CVE-2015-0275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0275">CVE-2015-0275 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1333/">CVE-2015-1333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1333">CVE-2015-1333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3212/">CVE-2015-3212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3212">CVE-2015-3212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4700">CVE-2015-4700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5364">CVE-2015-5364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5366">CVE-2015-5366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821287" comment="kernel-3.10.0-229.14.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821288" comment="kernel-abi-whitelists-3.10.0-229.14.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821289" comment="kernel-debug-3.10.0-229.14.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821292" comment="kernel-doc-3.10.0-229.14.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821293" comment="kernel-headers-3.10.0-229.14.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821294" comment="kernel-tools-3.10.0-229.14.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821295" comment="kernel-tools-libs-3.10.0-229.14.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821297" comment="perf-3.10.0-229.14.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821298" comment="python-perf-3.10.0-229.14.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:197" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1793.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1793.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5165">CVE-2015-5165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821299" comment="libcacard-1.5.3-86.el7_1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821300" comment="libcacard-devel-1.5.3-86.el7_1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821301" comment="libcacard-tools-1.5.3-86.el7_1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821302" comment="qemu-img-1.5.3-86.el7_1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821303" comment="qemu-kvm-1.5.3-86.el7_1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821304" comment="qemu-kvm-common-1.5.3-86.el7_1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821305" comment="qemu-kvm-tools-1.5.3-86.el7_1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:198" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4510" ref_url="https://www.suse.com/security/cve/CVE-2015-4510/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1834.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1834.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4500">CVE-2015-4500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4509">CVE-2015-4509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4510/">CVE-2015-4510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4510">CVE-2015-4510 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821306" comment="firefox-38.3.0-2.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:199" version="1" class="patch">
	<metadata>
		<title>security update for openldap (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1840.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1840.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6908">CVE-2015-6908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821307" comment="openldap-2.4.39-7.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821308" comment="openldap-clients-2.4.39-7.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821309" comment="openldap-devel-2.4.39-7.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821310" comment="openldap-servers-2.4.39-7.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821311" comment="openldap-servers-sql-2.4.39-7.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:200" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1852.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1852.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4500">CVE-2015-4500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4509">CVE-2015-4509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4517">CVE-2015-4517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4519">CVE-2015-4519 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4520">CVE-2015-4520 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4521">CVE-2015-4521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4522">CVE-2015-4522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7174">CVE-2015-7174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7175">CVE-2015-7175 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7176">CVE-2015-7176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7177">CVE-2015-7177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7180">CVE-2015-7180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821312" comment="thunderbird-38.3.0-1.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201" version="1" class="patch">
	<metadata>
		<title>security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260/" source="CVE"/>
		<reference ref_id="CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1890.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1890.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5260">CVE-2015-5260 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5261">CVE-2015-5261 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821313" comment="spice-server-0.12.4-9.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821314" comment="spice-server-devel-0.12.4-9.el7_1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202" version="1" class="patch">
	<metadata>
		<title>security update for libwmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1917.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1917.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0848">CVE-2015-0848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4588">CVE-2015-4588 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4695">CVE-2015-4695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4696">CVE-2015-4696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821315" comment="libwmf-0.2.8.4-41.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821316" comment="libwmf-devel-0.2.8.4-41.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821317" comment="libwmf-lite-0.2.8.4-41.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:203" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4868" ref_url="https://www.suse.com/security/cve/CVE-2015-4868/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1919.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1919.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4840">CVE-2015-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4868/">CVE-2015-4868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4868">CVE-2015-4868 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4881">CVE-2015-4881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821318" comment="java-1.8.0-openjdk-1.8.0.65-2.b17.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821319" comment="java-1.8.0-openjdk-accessibility-1.8.0.65-2.b17.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821320" comment="java-1.8.0-openjdk-demo-1.8.0.65-2.b17.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821321" comment="java-1.8.0-openjdk-devel-1.8.0.65-2.b17.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821322" comment="java-1.8.0-openjdk-headless-1.8.0.65-2.b17.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821323" comment="java-1.8.0-openjdk-javadoc-1.8.0.65-2.b17.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821324" comment="java-1.8.0-openjdk-src-1.8.0.65-2.b17.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:204" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1920.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1920.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4840">CVE-2015-4840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4881">CVE-2015-4881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821325" comment="java-1.7.0-openjdk-1.7.0.91-2.6.2.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821326" comment="java-1.7.0-openjdk-accessibility-1.7.0.91-2.6.2.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821327" comment="java-1.7.0-openjdk-demo-1.7.0.91-2.6.2.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821328" comment="java-1.7.0-openjdk-devel-1.7.0.91-2.6.2.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821329" comment="java-1.7.0-openjdk-headless-1.7.0.91-2.6.2.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821330" comment="java-1.7.0-openjdk-javadoc-1.7.0.91-2.6.2.1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821331" comment="java-1.7.0-openjdk-src-1.7.0.91-2.6.2.1.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205" version="1" class="patch">
	<metadata>
		<title>security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1930.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1930.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5300">CVE-2015-5300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7704">CVE-2015-7704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821332" comment="ntp-4.2.6p5-19.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821333" comment="ntp-doc-4.2.6p5-19.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821334" comment="ntp-perl-4.2.6p5-19.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821335" comment="ntpdate-4.2.6p5-19.el7_1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821336" comment="sntp-4.2.6p5-19.el7_1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1943.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1943.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1779">CVE-2015-1779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821337" comment="libcacard-1.5.3-86.el7_1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821338" comment="libcacard-devel-1.5.3-86.el7_1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821339" comment="libcacard-tools-1.5.3-86.el7_1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821340" comment="qemu-img-1.5.3-86.el7_1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821341" comment="qemu-kvm-1.5.3-86.el7_1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821342" comment="qemu-kvm-common-1.5.3-86.el7_1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821343" comment="qemu-kvm-tools-1.5.3-86.el7_1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:207" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8559" ref_url="https://www.suse.com/security/cve/CVE-2014-8559/" source="CVE"/>
		<reference ref_id="CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1978.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1978.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8559/">CVE-2014-8559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8559">CVE-2014-8559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5156">CVE-2015-5156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821344" comment="kernel-3.10.0-229.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821345" comment="kernel-abi-whitelists-3.10.0-229.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821346" comment="kernel-debug-3.10.0-229.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821349" comment="kernel-doc-3.10.0-229.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821350" comment="kernel-headers-3.10.0-229.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821351" comment="kernel-tools-3.10.0-229.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821352" comment="kernel-tools-libs-3.10.0-229.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821354" comment="perf-3.10.0-229.20.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821355" comment="python-perf-3.10.0-229.20.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:208" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3240" ref_url="https://www.suse.com/security/cve/CVE-2015-3240/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1979.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1979.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3240/">CVE-2015-3240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3240">CVE-2015-3240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821356" comment="libreswan-3.15-5.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:209" version="1" class="patch">
	<metadata>
		<title>security update for nspr (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1981.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1981.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821357" comment="nspr-4.10.8-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821358" comment="nspr-devel-4.10.8-2.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821359" comment="nss-3.19.1-7.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821360" comment="nss-devel-3.19.1-7.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821361" comment="nss-pkcs11-devel-3.19.1-7.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821362" comment="nss-sysinit-3.19.1-7.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821363" comment="nss-tools-3.19.1-7.el7_1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821364" comment="nss-util-3.19.1-4.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821365" comment="nss-util-devel-3.19.1-4.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:210" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:1982.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:1982.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4513">CVE-2015-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7188">CVE-2015-7188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7189">CVE-2015-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7193">CVE-2015-7193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7194">CVE-2015-7194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7196">CVE-2015-7196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7197">CVE-2015-7197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7198">CVE-2015-7198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821366" comment="firefox-38.4.0-1.el7_1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:211" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2078.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2078.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5288">CVE-2015-5288 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5289">CVE-2015-5289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821367" comment="postgresql-9.2.14-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821368" comment="postgresql-contrib-9.2.14-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821369" comment="postgresql-devel-9.2.14-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821370" comment="postgresql-docs-9.2.14-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821371" comment="postgresql-libs-9.2.14-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821372" comment="postgresql-plperl-9.2.14-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821373" comment="postgresql-plpython-9.2.14-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821374" comment="postgresql-pltcl-9.2.14-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821375" comment="postgresql-server-9.2.14-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821376" comment="postgresql-test-9.2.14-1.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821377" comment="postgresql-upgrade-9.2.14-1.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:212" version="1" class="patch">
	<metadata>
		<title>security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2079.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2079.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8484">CVE-2014-8484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8485">CVE-2014-8485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8501">CVE-2014-8501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8502">CVE-2014-8502 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8503">CVE-2014-8503 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8504">CVE-2014-8504 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8737">CVE-2014-8737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8738">CVE-2014-8738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821378" comment="binutils-2.23.52.0.1-55.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821379" comment="binutils-devel-2.23.52.0.1-55.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:213" version="1" class="patch">
	<metadata>
		<title>security update for java-1.6.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2086.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2086.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4734">CVE-2015-4734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4803">CVE-2015-4803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4805">CVE-2015-4805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4806">CVE-2015-4806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4835">CVE-2015-4835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4842">CVE-2015-4842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4843">CVE-2015-4843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4844">CVE-2015-4844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4860">CVE-2015-4860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4872">CVE-2015-4872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4881">CVE-2015-4881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4882">CVE-2015-4882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4883">CVE-2015-4883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4893">CVE-2015-4893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4903">CVE-2015-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4911">CVE-2015-4911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821380" comment="java-1.6.0-openjdk-1.6.0.37-1.13.9.4.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821381" comment="java-1.6.0-openjdk-demo-1.6.0.37-1.13.9.4.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821382" comment="java-1.6.0-openjdk-devel-1.6.0.37-1.13.9.4.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821383" comment="java-1.6.0-openjdk-javadoc-1.6.0.37-1.13.9.4.el7_1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821384" comment="java-1.6.0-openjdk-src-1.6.0.37-1.13.9.4.el7_1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:214" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2088.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2088.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5600">CVE-2015-5600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6563">CVE-2015-6563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6564">CVE-2015-6564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821385" comment="openssh-6.6.1p1-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821386" comment="openssh-askpass-6.6.1p1-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821387" comment="openssh-clients-6.6.1p1-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821388" comment="openssh-keycat-6.6.1p1-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821389" comment="openssh-ldap-6.6.1p1-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821390" comment="openssh-server-6.6.1p1-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821391" comment="openssh-server-sysvinit-6.6.1p1-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821392" comment="pam_ssh_agent_auth-0.9.3-9.22.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215" version="1" class="patch">
	<metadata>
		<title>security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753/" source="CVE"/>
		<reference ref_id="CVE-2014-4616" ref_url="https://www.suse.com/security/cve/CVE-2014-4616/" source="CVE"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2101.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2101.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1752">CVE-2013-1752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1753">CVE-2013-1753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4616/">CVE-2014-4616 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4616">CVE-2014-4616 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7185">CVE-2014-7185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821393" comment="python-2.7.5-34.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821394" comment="python-debug-2.7.5-34.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821395" comment="python-devel-2.7.5-34.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821396" comment="python-libs-2.7.5-34.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821397" comment="python-test-2.7.5-34.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821398" comment="python-tools-2.7.5-34.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821399" comment="tkinter-2.7.5-34.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216" version="1" class="patch">
	<metadata>
		<title>security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2108.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2108.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9112">CVE-2014-9112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821400" comment="cpio-2.11-24.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217" version="1" class="patch">
	<metadata>
		<title>security update for grep (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-1345" ref_url="https://www.suse.com/security/cve/CVE-2015-1345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2111.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2111.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1345/">CVE-2015-1345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1345">CVE-2015-1345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821401" comment="grep-2.20-2.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218" version="1" class="patch">
	<metadata>
		<title>security update for openldap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3276" ref_url="https://www.suse.com/security/cve/CVE-2015-3276/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2131.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2131.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3276/">CVE-2015-3276 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3276">CVE-2015-3276 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821402" comment="openldap-2.4.40-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821403" comment="openldap-clients-2.4.40-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821404" comment="openldap-devel-2.4.40-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821405" comment="openldap-servers-2.4.40-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821406" comment="openldap-servers-sql-2.4.40-8.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219" version="1" class="patch">
	<metadata>
		<title>security update for libssh2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2140.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2140.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1782">CVE-2015-1782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821407" comment="libssh2-1.4.3-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821408" comment="libssh2-devel-1.4.3-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821409" comment="libssh2-docs-1.4.3-10.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220" version="1" class="patch">
	<metadata>
		<title>security update for xfsprogs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2151.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2151.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2150">CVE-2012-2150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821410" comment="xfsprogs-3.2.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821411" comment="xfsprogs-devel-3.2.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821412" comment="xfsprogs-qa-devel-3.2.2-2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:221" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2010-5313" ref_url="https://www.suse.com/security/cve/CVE-2010-5313/" source="CVE"/>
		<reference ref_id="CVE-2013-7421" ref_url="https://www.suse.com/security/cve/CVE-2013-7421/" source="CVE"/>
		<reference ref_id="CVE-2014-3647" ref_url="https://www.suse.com/security/cve/CVE-2014-3647/" source="CVE"/>
		<reference ref_id="CVE-2014-7842" ref_url="https://www.suse.com/security/cve/CVE-2014-7842/" source="CVE"/>
		<reference ref_id="CVE-2014-8171" ref_url="https://www.suse.com/security/cve/CVE-2014-8171/" source="CVE"/>
		<reference ref_id="CVE-2014-9419" ref_url="https://www.suse.com/security/cve/CVE-2014-9419/" source="CVE"/>
		<reference ref_id="CVE-2014-9644" ref_url="https://www.suse.com/security/cve/CVE-2014-9644/" source="CVE"/>
		<reference ref_id="CVE-2015-0239" ref_url="https://www.suse.com/security/cve/CVE-2015-0239/" source="CVE"/>
		<reference ref_id="CVE-2015-2925" ref_url="https://www.suse.com/security/cve/CVE-2015-2925/" source="CVE"/>
		<reference ref_id="CVE-2015-3339" ref_url="https://www.suse.com/security/cve/CVE-2015-3339/" source="CVE"/>
		<reference ref_id="CVE-2015-4170" ref_url="https://www.suse.com/security/cve/CVE-2015-4170/" source="CVE"/>
		<reference ref_id="CVE-2015-5283" ref_url="https://www.suse.com/security/cve/CVE-2015-5283/" source="CVE"/>
		<reference ref_id="CVE-2015-6526" ref_url="https://www.suse.com/security/cve/CVE-2015-6526/" source="CVE"/>
		<reference ref_id="CVE-2015-7613" ref_url="https://www.suse.com/security/cve/CVE-2015-7613/" source="CVE"/>
		<reference ref_id="CVE-2015-7837" ref_url="https://www.suse.com/security/cve/CVE-2015-7837/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2152.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2152.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5313/">CVE-2010-5313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5313">CVE-2010-5313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7421/">CVE-2013-7421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7421">CVE-2013-7421 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-3647/">CVE-2014-3647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3647">CVE-2014-3647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7842/">CVE-2014-7842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7842">CVE-2014-7842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8171/">CVE-2014-8171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8171">CVE-2014-8171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9419/">CVE-2014-9419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9419">CVE-2014-9419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9644/">CVE-2014-9644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9644">CVE-2014-9644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0239/">CVE-2015-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0239">CVE-2015-0239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2925/">CVE-2015-2925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2925">CVE-2015-2925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3339/">CVE-2015-3339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3339">CVE-2015-3339 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4170/">CVE-2015-4170 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4170">CVE-2015-4170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5283/">CVE-2015-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5283">CVE-2015-5283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6526/">CVE-2015-6526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6526">CVE-2015-6526 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-7613/">CVE-2015-7613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7613">CVE-2015-7613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7837/">CVE-2015-7837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7837">CVE-2015-7837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821413" comment="kernel-3.10.0-327.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821414" comment="kernel-abi-whitelists-3.10.0-327.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821415" comment="kernel-debug-3.10.0-327.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821418" comment="kernel-doc-3.10.0-327.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821419" comment="kernel-headers-3.10.0-327.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821420" comment="kernel-tools-3.10.0-327.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821421" comment="kernel-tools-libs-3.10.0-327.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821423" comment="perf-3.10.0-327.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821424" comment="python-perf-3.10.0-327.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:222" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2154.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2154.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5355">CVE-2014-5355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2694">CVE-2015-2694 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821425" comment="krb5-devel-1.13.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821426" comment="krb5-libs-1.13.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821427" comment="krb5-pkinit-1.13.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821428" comment="krb5-server-1.13.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821429" comment="krb5-server-ldap-1.13.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821430" comment="krb5-workstation-1.13.2-10.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:223" version="1" class="patch">
	<metadata>
		<title>security update for file (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-0207" ref_url="https://www.suse.com/security/cve/CVE-2014-0207/" source="CVE"/>
		<reference ref_id="CVE-2014-0237" ref_url="https://www.suse.com/security/cve/CVE-2014-0237/" source="CVE"/>
		<reference ref_id="CVE-2014-0238" ref_url="https://www.suse.com/security/cve/CVE-2014-0238/" source="CVE"/>
		<reference ref_id="CVE-2014-3478" ref_url="https://www.suse.com/security/cve/CVE-2014-3478/" source="CVE"/>
		<reference ref_id="CVE-2014-3479" ref_url="https://www.suse.com/security/cve/CVE-2014-3479/" source="CVE"/>
		<reference ref_id="CVE-2014-3480" ref_url="https://www.suse.com/security/cve/CVE-2014-3480/" source="CVE"/>
		<reference ref_id="CVE-2014-3487" ref_url="https://www.suse.com/security/cve/CVE-2014-3487/" source="CVE"/>
		<reference ref_id="CVE-2014-3538" ref_url="https://www.suse.com/security/cve/CVE-2014-3538/" source="CVE"/>
		<reference ref_id="CVE-2014-3587" ref_url="https://www.suse.com/security/cve/CVE-2014-3587/" source="CVE"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<reference ref_id="CVE-2014-9652" ref_url="https://www.suse.com/security/cve/CVE-2014-9652/" source="CVE"/>
		<reference ref_id="CVE-2014-9653" ref_url="https://www.suse.com/security/cve/CVE-2014-9653/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2155.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2155.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0207/">CVE-2014-0207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0207">CVE-2014-0207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0237/">CVE-2014-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0237">CVE-2014-0237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0238/">CVE-2014-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0238">CVE-2014-0238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3478/">CVE-2014-3478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3478">CVE-2014-3478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3479/">CVE-2014-3479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3479">CVE-2014-3479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3480/">CVE-2014-3480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3480">CVE-2014-3480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3487/">CVE-2014-3487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3487">CVE-2014-3487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3538/">CVE-2014-3538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3538">CVE-2014-3538 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3587/">CVE-2014-3587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3587">CVE-2014-3587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3710">CVE-2014-3710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8116">CVE-2014-8116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8117">CVE-2014-8117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9652/">CVE-2014-9652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9652">CVE-2014-9652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9653/">CVE-2014-9653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9653">CVE-2014-9653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821431" comment="file-5.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821432" comment="file-devel-5.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821433" comment="file-libs-5.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821434" comment="file-static-5.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821435" comment="python-magic-5.11-31.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:224" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2159.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2159.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3613">CVE-2014-3613 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3707">CVE-2014-3707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8150">CVE-2014-8150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3143">CVE-2015-3143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3148">CVE-2015-3148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821436" comment="curl-7.29.0-25.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821437" comment="libcurl-7.29.0-25.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821438" comment="libcurl-devel-7.29.0-25.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:225" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5277" ref_url="https://www.suse.com/security/cve/CVE-2015-5277/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2172.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2172.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5277/">CVE-2015-5277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5277">CVE-2015-5277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821439" comment="glibc-2.17-106.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821440" comment="glibc-common-2.17-106.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821441" comment="glibc-devel-2.17-106.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821442" comment="glibc-headers-2.17-106.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821443" comment="glibc-static-2.17-106.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821444" comment="glibc-utils-2.17-106.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821445" comment="nscd-2.17-106.el7_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:226" version="1" class="patch">
	<metadata>
		<title>security update for rubygem-bundler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2013-0334" ref_url="https://www.suse.com/security/cve/CVE-2013-0334/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2180.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2180.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0334/">CVE-2013-0334 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0334">CVE-2013-0334 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821446" comment="rubygem-bundler-1.7.8-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821447" comment="rubygem-bundler-doc-1.7.8-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821448" comment="rubygem-thor-0.19.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821449" comment="rubygem-thor-doc-0.19.1-1.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821446" comment="rubygem-bundler-1.7.8-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821447" comment="rubygem-bundler-doc-1.7.8-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821448" comment="rubygem-thor-0.19.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821449" comment="rubygem-thor-doc-0.19.1-1.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:227" version="1" class="patch">
	<metadata>
		<title>security update for realmd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-2704" ref_url="https://www.suse.com/security/cve/CVE-2015-2704/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2184.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2184.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2704/">CVE-2015-2704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2704">CVE-2015-2704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821450" comment="realmd-0.16.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821451" comment="realmd-devel-docs-0.16.1-5.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:228" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2199.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2199.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7423">CVE-2013-7423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1472">CVE-2015-1472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1473">CVE-2015-1473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1781">CVE-2015-1781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821452" comment="glibc-2.17-105.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821453" comment="glibc-common-2.17-105.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821454" comment="glibc-devel-2.17-105.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821455" comment="glibc-headers-2.17-105.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821456" comment="glibc-static-2.17-105.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821457" comment="glibc-utils-2.17-105.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821458" comment="nscd-2.17-105.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:229" version="1" class="patch">
	<metadata>
		<title>security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297/" source="CVE"/>
		<reference ref_id="CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298/" source="CVE"/>
		<reference ref_id="CVE-2014-9750" ref_url="https://www.suse.com/security/cve/CVE-2014-9750/" source="CVE"/>
		<reference ref_id="CVE-2014-9751" ref_url="https://www.suse.com/security/cve/CVE-2014-9751/" source="CVE"/>
		<reference ref_id="CVE-2015-1798" ref_url="https://www.suse.com/security/cve/CVE-2015-1798/" source="CVE"/>
		<reference ref_id="CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799/" source="CVE"/>
		<reference ref_id="CVE-2015-3405" ref_url="https://www.suse.com/security/cve/CVE-2015-3405/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2231.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2231.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9297">CVE-2014-9297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9298">CVE-2014-9298 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9750/">CVE-2014-9750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9750">CVE-2014-9750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9751/">CVE-2014-9751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9751">CVE-2014-9751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1798/">CVE-2015-1798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1798">CVE-2015-1798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1799">CVE-2015-1799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3405/">CVE-2015-3405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3405">CVE-2015-3405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821459" comment="ntp-4.2.6p5-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821460" comment="ntp-doc-4.2.6p5-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821461" comment="ntp-perl-4.2.6p5-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821462" comment="ntpdate-4.2.6p5-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821463" comment="sntp-4.2.6p5-22.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:230" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240/" source="CVE"/>
		<reference ref_id="CVE-2014-8241" ref_url="https://www.suse.com/security/cve/CVE-2014-8241/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2233.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2233.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8240">CVE-2014-8240 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8241/">CVE-2014-8241 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8241">CVE-2014-8241 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821464" comment="tigervnc-1.3.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821465" comment="tigervnc-icons-1.3.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821466" comment="tigervnc-license-1.3.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821467" comment="tigervnc-server-1.3.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821468" comment="tigervnc-server-applet-1.3.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821469" comment="tigervnc-server-minimal-1.3.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821470" comment="tigervnc-server-module-1.3.1-3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:231" version="1" class="patch">
	<metadata>
		<title>security update for rest (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-2675" ref_url="https://www.suse.com/security/cve/CVE-2015-2675/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2237.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2237.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2675/">CVE-2015-2675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2675">CVE-2015-2675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821471" comment="rest-0.7.92-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821472" comment="rest-devel-0.7.92-3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:232" version="1" class="patch">
	<metadata>
		<title>security update for chrony (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-1821" ref_url="https://www.suse.com/security/cve/CVE-2015-1821/" source="CVE"/>
		<reference ref_id="CVE-2015-1822" ref_url="https://www.suse.com/security/cve/CVE-2015-1822/" source="CVE"/>
		<reference ref_id="CVE-2015-1853" ref_url="https://www.suse.com/security/cve/CVE-2015-1853/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2241.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2241.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1821/">CVE-2015-1821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1821">CVE-2015-1821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1822/">CVE-2015-1822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1822">CVE-2015-1822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1853/">CVE-2015-1853 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1853">CVE-2015-1853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821473" comment="chrony-2.1.1-1.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:233" version="1" class="patch">
	<metadata>
		<title>security update for netcf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2248.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2248.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8119">CVE-2014-8119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821474" comment="netcf-0.2.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821475" comment="netcf-devel-0.2.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821476" comment="netcf-libs-0.2.8-1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:234" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2290.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2290.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3225">CVE-2015-3225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821477" comment="pcs-0.9.143-15.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:235" version="1" class="patch">
	<metadata>
		<title>security update for ModemManager (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2315.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2315.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0272">CVE-2015-0272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2924">CVE-2015-2924 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821478" comment="ModemManager-1.1.0-8.git20130913.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821479" comment="ModemManager-devel-1.1.0-8.git20130913.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821480" comment="ModemManager-glib-1.1.0-8.git20130913.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821481" comment="ModemManager-glib-devel-1.1.0-8.git20130913.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821482" comment="ModemManager-vala-1.1.0-8.git20130913.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821483" comment="NetworkManager-1.0.6-27.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821484" comment="NetworkManager-adsl-1.0.6-27.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821485" comment="NetworkManager-bluetooth-1.0.6-27.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821486" comment="NetworkManager-config-routing-rules-1.0.6-27.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821487" comment="NetworkManager-config-server-1.0.6-27.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821488" comment="NetworkManager-devel-1.0.6-27.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821489" comment="NetworkManager-glib-1.0.6-27.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821490" comment="NetworkManager-glib-devel-1.0.6-27.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821491" comment="NetworkManager-libnm-1.0.6-27.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821492" comment="NetworkManager-libnm-devel-1.0.6-27.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821493" comment="NetworkManager-libreswan-1.0.6-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821494" comment="NetworkManager-libreswan-gnome-1.0.6-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821495" comment="NetworkManager-team-1.0.6-27.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821496" comment="NetworkManager-tui-1.0.6-27.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821497" comment="NetworkManager-wifi-1.0.6-27.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821498" comment="NetworkManager-wwan-1.0.6-27.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821499" comment="libnm-gtk-1.0.6-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821500" comment="libnm-gtk-devel-1.0.6-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821501" comment="network-manager-applet-1.0.6-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821502" comment="nm-connection-editor-1.0.6-2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:236" version="1" class="patch">
	<metadata>
		<title>security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2345.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2345.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3565">CVE-2014-3565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821503" comment="net-snmp-5.7.2-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821504" comment="net-snmp-agent-libs-5.7.2-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821505" comment="net-snmp-devel-5.7.2-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821506" comment="net-snmp-gui-5.7.2-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821507" comment="net-snmp-libs-5.7.2-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821508" comment="net-snmp-perl-5.7.2-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821509" comment="net-snmp-python-5.7.2-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821510" comment="net-snmp-sysvinit-5.7.2-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821511" comment="net-snmp-utils-5.7.2-24.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:237" version="1" class="patch">
	<metadata>
		<title>security update for sssd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5292" ref_url="https://www.suse.com/security/cve/CVE-2015-5292/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2355.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2355.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5292/">CVE-2015-5292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5292">CVE-2015-5292 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821512" comment="libipa_hbac-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821513" comment="libipa_hbac-devel-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821514" comment="libsss_idmap-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821515" comment="libsss_idmap-devel-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821516" comment="libsss_nss_idmap-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821517" comment="libsss_nss_idmap-devel-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821518" comment="libsss_simpleifp-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821519" comment="libsss_simpleifp-devel-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821520" comment="python-libipa_hbac-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821521" comment="python-libsss_nss_idmap-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821522" comment="python-sss-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821523" comment="python-sss-murmur-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821524" comment="python-sssdconfig-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821525" comment="sssd-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821526" comment="sssd-ad-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821527" comment="sssd-client-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821528" comment="sssd-common-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821529" comment="sssd-common-pac-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821530" comment="sssd-dbus-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821531" comment="sssd-ipa-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821532" comment="sssd-krb5-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821533" comment="sssd-krb5-common-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821534" comment="sssd-ldap-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821535" comment="sssd-libwbclient-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821536" comment="sssd-libwbclient-devel-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821537" comment="sssd-proxy-1.13.0-40.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821538" comment="sssd-tools-1.13.0-40.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:238" version="1" class="patch">
	<metadata>
		<title>security update for cups-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3258" ref_url="https://www.suse.com/security/cve/CVE-2015-3258/" source="CVE"/>
		<reference ref_id="CVE-2015-3279" ref_url="https://www.suse.com/security/cve/CVE-2015-3279/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2360.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2360.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3258/">CVE-2015-3258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3258">CVE-2015-3258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3279/">CVE-2015-3279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3279">CVE-2015-3279 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821539" comment="cups-filters-1.0.35-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821540" comment="cups-filters-devel-1.0.35-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821541" comment="cups-filters-libs-1.0.35-21.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:239" version="1" class="patch">
	<metadata>
		<title>security update for openhpi (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3248" ref_url="https://www.suse.com/security/cve/CVE-2015-3248/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2369.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2369.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3248/">CVE-2015-3248 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3248">CVE-2015-3248 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821542" comment="openhpi-3.4.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821543" comment="openhpi-devel-3.4.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821544" comment="openhpi-libs-3.4.0-2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:240" version="1" class="patch">
	<metadata>
		<title>security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3455" ref_url="https://www.suse.com/security/cve/CVE-2015-3455/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2378.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2378.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3455/">CVE-2015-3455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3455">CVE-2015-3455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821545" comment="squid-3.3.8-26.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821546" comment="squid-sysvinit-3.3.8-26.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:241" version="1" class="patch">
	<metadata>
		<title>security update for pacemaker (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-1867" ref_url="https://www.suse.com/security/cve/CVE-2015-1867/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2383.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2383.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1867/">CVE-2015-1867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1867">CVE-2015-1867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821547" comment="pacemaker-1.1.13-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821548" comment="pacemaker-cli-1.1.13-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821549" comment="pacemaker-cluster-libs-1.1.13-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821550" comment="pacemaker-cts-1.1.13-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821551" comment="pacemaker-doc-1.1.13-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821552" comment="pacemaker-libs-1.1.13-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821553" comment="pacemaker-libs-devel-1.1.13-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821554" comment="pacemaker-nagios-plugins-metadata-1.1.13-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821555" comment="pacemaker-remote-1.1.13-10.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:242" version="1" class="patch">
	<metadata>
		<title>security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710/" source="CVE"/>
		<reference ref_id="CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711/" source="CVE"/>
		<reference ref_id="CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712/" source="CVE"/>
		<reference ref_id="CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713/" source="CVE"/>
		<reference ref_id="CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<reference ref_id="CVE-2015-3182" ref_url="https://www.suse.com/security/cve/CVE-2015-3182/" source="CVE"/>
		<reference ref_id="CVE-2015-3810" ref_url="https://www.suse.com/security/cve/CVE-2015-3810/" source="CVE"/>
		<reference ref_id="CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811/" source="CVE"/>
		<reference ref_id="CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812/" source="CVE"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2393.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2393.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8710">CVE-2014-8710 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8711">CVE-2014-8711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8712">CVE-2014-8712 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8713">CVE-2014-8713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8714">CVE-2014-8714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0562">CVE-2015-0562 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0563">CVE-2015-0563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0564">CVE-2015-0564 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2188">CVE-2015-2188 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2189">CVE-2015-2189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2191">CVE-2015-2191 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3182/">CVE-2015-3182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3182">CVE-2015-3182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3810/">CVE-2015-3810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3810">CVE-2015-3810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3811">CVE-2015-3811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3812">CVE-2015-3812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3813">CVE-2015-3813 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6243">CVE-2015-6243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6244">CVE-2015-6244 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6245">CVE-2015-6245 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6246">CVE-2015-6246 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6248">CVE-2015-6248 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821556" comment="wireshark-1.10.14-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821557" comment="wireshark-devel-1.10.14-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821558" comment="wireshark-gnome-1.10.14-7.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:243" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5281" ref_url="https://www.suse.com/security/cve/CVE-2015-5281/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2401.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2401.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5281/">CVE-2015-5281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5281">CVE-2015-5281 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821559" comment="grub2-2.02-0.29.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821560" comment="grub2-efi-2.02-0.29.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821561" comment="grub2-efi-modules-2.02-0.29.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821562" comment="grub2-tools-2.02-0.29.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:244" version="1" class="patch">
	<metadata>
		<title>security update for autofs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8169" ref_url="https://www.suse.com/security/cve/CVE-2014-8169/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2417.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2417.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8169/">CVE-2014-8169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8169">CVE-2014-8169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821563" comment="autofs-5.0.7-54.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:245" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8602" ref_url="https://www.suse.com/security/cve/CVE-2014-8602/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2455.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2455.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8602/">CVE-2014-8602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8602">CVE-2014-8602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821564" comment="unbound-1.4.20-26.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821565" comment="unbound-devel-1.4.20-26.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821566" comment="unbound-libs-1.4.20-26.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821567" comment="unbound-python-1.4.20-26.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:246" version="1" class="patch">
	<metadata>
		<title>security update for abrt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5273" ref_url="https://www.suse.com/security/cve/CVE-2015-5273/" source="CVE"/>
		<reference ref_id="CVE-2015-5287" ref_url="https://www.suse.com/security/cve/CVE-2015-5287/" source="CVE"/>
		<reference ref_id="CVE-2015-5302" ref_url="https://www.suse.com/security/cve/CVE-2015-5302/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2505.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2505.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5273/">CVE-2015-5273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5273">CVE-2015-5273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5287/">CVE-2015-5287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5287">CVE-2015-5287 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5302/">CVE-2015-5302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5302">CVE-2015-5302 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821568" comment="abrt-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821569" comment="abrt-addon-ccpp-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821570" comment="abrt-addon-kerneloops-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821571" comment="abrt-addon-pstoreoops-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821572" comment="abrt-addon-python-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821573" comment="abrt-addon-upload-watch-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821574" comment="abrt-addon-vmcore-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821575" comment="abrt-addon-xorg-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821576" comment="abrt-cli-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821577" comment="abrt-console-notification-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821578" comment="abrt-dbus-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821579" comment="abrt-desktop-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821580" comment="abrt-devel-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821581" comment="abrt-gui-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821582" comment="abrt-gui-devel-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821583" comment="abrt-gui-libs-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821584" comment="abrt-libs-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821585" comment="abrt-python-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821586" comment="abrt-python-doc-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821587" comment="abrt-retrace-client-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821588" comment="abrt-tui-2.1.11-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821589" comment="libreport-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821590" comment="libreport-anaconda-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821591" comment="libreport-cli-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821592" comment="libreport-compat-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821593" comment="libreport-devel-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821594" comment="libreport-filesystem-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821595" comment="libreport-gtk-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821596" comment="libreport-gtk-devel-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821597" comment="libreport-newt-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821598" comment="libreport-plugin-bugzilla-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821599" comment="libreport-plugin-kerneloops-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821600" comment="libreport-plugin-logger-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821601" comment="libreport-plugin-mailx-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821602" comment="libreport-plugin-reportuploader-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821603" comment="libreport-python-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821604" comment="libreport-web-2.1.11-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821605" comment="libreport-web-devel-2.1.11-31.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:247" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2519.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2519.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4513">CVE-2015-4513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7189">CVE-2015-7189 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7193">CVE-2015-7193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7197">CVE-2015-7197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7198">CVE-2015-7198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7199">CVE-2015-7199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7200">CVE-2015-7200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821606" comment="thunderbird-38.4.0-1.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248" version="1" class="patch">
	<metadata>
		<title>security update for apache-commons-collections (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2015-7501" ref_url="https://www.suse.com/security/cve/CVE-2015-7501/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2522.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2522.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7501/">CVE-2015-7501 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7501">CVE-2015-7501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821607" comment="apache-commons-collections-3.2.1-22.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821608" comment="apache-commons-collections-javadoc-3.2.1-22.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821609" comment="apache-commons-collections-testframework-3.2.1-22.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821610" comment="apache-commons-collections-testframework-javadoc-3.2.1-22.el7_2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821607" comment="apache-commons-collections-3.2.1-22.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821608" comment="apache-commons-collections-javadoc-3.2.1-22.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821609" comment="apache-commons-collections-testframework-3.2.1-22.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821610" comment="apache-commons-collections-testframework-javadoc-3.2.1-22.el7_2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2550.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2550.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8241">CVE-2015-8241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8317">CVE-2015-8317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821611" comment="libxml2-2.9.1-6.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821612" comment="libxml2-devel-2.9.1-6.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821613" comment="libxml2-python-2.9.1-6.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821614" comment="libxml2-static-2.9.1-6.el7_2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2552.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2552.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821615" comment="kernel-3.10.0-327.3.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821616" comment="kernel-abi-whitelists-3.10.0-327.3.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821617" comment="kernel-debug-3.10.0-327.3.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821620" comment="kernel-doc-3.10.0-327.3.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821621" comment="kernel-headers-3.10.0-327.3.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821622" comment="kernel-tools-3.10.0-327.3.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821623" comment="kernel-tools-libs-3.10.0-327.3.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821625" comment="perf-3.10.0-327.3.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821626" comment="python-perf-3.10.0-327.3.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251" version="1" class="patch">
	<metadata>
		<title>security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<description>
This security update provides a functional equivalent of RHSA-2015:2561.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2561.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821627" comment="emacs-git-1.8.3.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821628" comment="emacs-git-el-1.8.3.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821629" comment="git-1.8.3.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821630" comment="git-all-1.8.3.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821631" comment="git-bzr-1.8.3.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821632" comment="git-cvs-1.8.3.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821633" comment="git-daemon-1.8.3.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821634" comment="git-email-1.8.3.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821635" comment="git-gui-1.8.3.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821636" comment="git-hg-1.8.3.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821637" comment="git-p4-1.8.3.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821638" comment="git-svn-1.8.3.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821639" comment="gitk-1.8.3.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821640" comment="gitweb-1.8.3.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821641" comment="perl-Git-1.8.3.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821642" comment="perl-Git-SVN-1.8.3.1-6.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252" version="1" class="patch">
	<metadata>
		<title>security update for libpng12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2595.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2595.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7981">CVE-2015-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8472">CVE-2015-8472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821643" comment="libpng12-1.2.50-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821644" comment="libpng12-devel-1.2.50-7.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253" version="1" class="patch">
	<metadata>
		<title>security update for libpng (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2596.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2596.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8472">CVE-2015-8472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821645" comment="libpng-1.5.13-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821646" comment="libpng-devel-1.5.13-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821647" comment="libpng-static-1.5.13-7.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2617.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2617.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3196">CVE-2015-3196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821648" comment="openssl-1.0.1e-51.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821649" comment="openssl-devel-1.0.1e-51.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821650" comment="openssl-libs-1.0.1e-51.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821651" comment="openssl-perl-1.0.1e-51.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821652" comment="openssl-static-1.0.1e-51.el7_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:255" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2623.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2623.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8370">CVE-2015-8370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821653" comment="grub2-2.02-0.33.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821654" comment="grub2-efi-2.02-0.33.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821655" comment="grub2-efi-modules-2.02-0.33.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821656" comment="grub2-tools-2.02-0.33.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:256" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2655.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2655.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8000">CVE-2015-8000 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821657" comment="bind-9.9.4-29.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821658" comment="bind-chroot-9.9.4-29.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821659" comment="bind-devel-9.9.4-29.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821660" comment="bind-libs-9.9.4-29.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821661" comment="bind-libs-lite-9.9.4-29.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821662" comment="bind-license-9.9.4-29.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821663" comment="bind-lite-devel-9.9.4-29.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821664" comment="bind-pkcs11-9.9.4-29.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821665" comment="bind-pkcs11-devel-9.9.4-29.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821666" comment="bind-pkcs11-libs-9.9.4-29.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821667" comment="bind-pkcs11-utils-9.9.4-29.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821668" comment="bind-sdb-9.9.4-29.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821669" comment="bind-sdb-chroot-9.9.4-29.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821670" comment="bind-utils-9.9.4-29.el7_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:257" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2015:2657.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2015:2657.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7201">CVE-2015-7201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7205">CVE-2015-7205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7210">CVE-2015-7210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7212">CVE-2015-7212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7213">CVE-2015-7213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7214">CVE-2015-7214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7222">CVE-2015-7222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821671" comment="firefox-38.5.0-3.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:258" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0001.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0001.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7201">CVE-2015-7201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7205">CVE-2015-7205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7212">CVE-2015-7212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7213">CVE-2015-7213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7214">CVE-2015-7214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821672" comment="thunderbird-38.5.0-1.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:259" version="1" class="patch">
	<metadata>
		<title>security update for rpcbind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0005.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0005.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7236">CVE-2015-7236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821673" comment="rpcbind-0.2.0-33.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:260" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-7540" ref_url="https://www.suse.com/security/cve/CVE-2015-7540/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0006.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0006.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3223">CVE-2015-3223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5252">CVE-2015-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5296">CVE-2015-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5299">CVE-2015-5299 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7540/">CVE-2015-7540 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7540">CVE-2015-7540 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821674" comment="ctdb-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821675" comment="ctdb-devel-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821676" comment="ctdb-tests-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821677" comment="libsmbclient-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821678" comment="libsmbclient-devel-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821679" comment="libwbclient-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821680" comment="libwbclient-devel-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821681" comment="samba-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821682" comment="samba-client-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821683" comment="samba-client-libs-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821684" comment="samba-common-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821685" comment="samba-common-libs-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821686" comment="samba-common-tools-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821687" comment="samba-dc-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821688" comment="samba-dc-libs-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821689" comment="samba-devel-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821690" comment="samba-libs-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821691" comment="samba-pidl-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821692" comment="samba-python-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821693" comment="samba-test-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821694" comment="samba-test-devel-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821695" comment="samba-test-libs-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821696" comment="samba-vfs-glusterfs-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821697" comment="samba-winbind-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821698" comment="samba-winbind-clients-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821699" comment="samba-winbind-krb5-locator-4.2.3-11.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821700" comment="samba-winbind-modules-4.2.3-11.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:261" version="1" class="patch">
	<metadata>
		<title>security update for nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0007.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0007.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821701" comment="nss-3.19.1-19.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821702" comment="nss-devel-3.19.1-19.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821703" comment="nss-pkcs11-devel-3.19.1-19.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821704" comment="nss-sysinit-3.19.1-19.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821705" comment="nss-tools-3.19.1-19.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:262" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0008.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0008.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821706" comment="openssl-1.0.1e-51.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821707" comment="openssl-devel-1.0.1e-51.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821708" comment="openssl-libs-1.0.1e-51.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821709" comment="openssl-perl-1.0.1e-51.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821710" comment="openssl-static-1.0.1e-51.el7_2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:263" version="1" class="patch">
	<metadata>
		<title>security update for libldb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0009.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0009.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3223">CVE-2015-3223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5330">CVE-2015-5330 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821711" comment="ldb-tools-1.1.20-1.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821712" comment="libldb-1.1.20-1.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821713" comment="libldb-devel-1.1.20-1.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821714" comment="pyldb-1.1.20-1.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821715" comment="pyldb-devel-1.1.20-1.el7_2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:264" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0012.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0012.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821716" comment="gnutls-3.3.8-14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821717" comment="gnutls-c++-3.3.8-14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821718" comment="gnutls-dane-3.3.8-14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821719" comment="gnutls-devel-3.3.8-14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821720" comment="gnutls-utils-3.3.8-14.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:265" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0043.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0043.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0777">CVE-2016-0777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0778">CVE-2016-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821721" comment="openssh-6.6.1p1-23.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821722" comment="openssh-askpass-6.6.1p1-23.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821723" comment="openssh-clients-6.6.1p1-23.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821724" comment="openssh-keycat-6.6.1p1-23.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821725" comment="openssh-ldap-6.6.1p1-23.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821726" comment="openssh-server-6.6.1p1-23.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821727" comment="openssh-server-sysvinit-6.6.1p1-23.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821728" comment="pam_ssh_agent_auth-0.9.3-9.23.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:266" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0475" ref_url="https://www.suse.com/security/cve/CVE-2016-0475/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0049.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0049.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0475/">CVE-2016-0475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0475">CVE-2016-0475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821729" comment="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821730" comment="java-1.8.0-openjdk-accessibility-1.8.0.71-2.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821731" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.71-2.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821732" comment="java-1.8.0-openjdk-debug-1.8.0.71-2.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821733" comment="java-1.8.0-openjdk-demo-1.8.0.71-2.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821734" comment="java-1.8.0-openjdk-demo-debug-1.8.0.71-2.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821735" comment="java-1.8.0-openjdk-devel-1.8.0.71-2.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821736" comment="java-1.8.0-openjdk-devel-debug-1.8.0.71-2.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821737" comment="java-1.8.0-openjdk-headless-1.8.0.71-2.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821738" comment="java-1.8.0-openjdk-headless-debug-1.8.0.71-2.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821739" comment="java-1.8.0-openjdk-javadoc-1.8.0.71-2.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821740" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.71-2.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821741" comment="java-1.8.0-openjdk-src-1.8.0.71-2.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821742" comment="java-1.8.0-openjdk-src-debug-1.8.0.71-2.b15.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:267" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0054.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0054.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4871">CVE-2015-4871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821743" comment="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821744" comment="java-1.7.0-openjdk-accessibility-1.7.0.95-2.6.4.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821745" comment="java-1.7.0-openjdk-demo-1.7.0.95-2.6.4.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821746" comment="java-1.7.0-openjdk-devel-1.7.0.95-2.6.4.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821747" comment="java-1.7.0-openjdk-headless-1.7.0.95-2.6.4.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821748" comment="java-1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821749" comment="java-1.7.0-openjdk-src-1.7.0.95-2.6.4.0.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:268" version="1" class="patch">
	<metadata>
		<title>security update for ntp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0063.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0063.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8138">CVE-2015-8138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821750" comment="ntp-4.2.6p5-22.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821751" comment="ntp-doc-4.2.6p5-22.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821752" comment="ntp-perl-4.2.6p5-22.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821753" comment="ntpdate-4.2.6p5-22.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821754" comment="sntp-4.2.6p5-22.el7_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:269" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0728" ref_url="https://www.suse.com/security/cve/CVE-2016-0728/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0064.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0064.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0728/">CVE-2016-0728 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0728">CVE-2016-0728 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821755" comment="kernel-3.10.0-327.4.5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821756" comment="kernel-abi-whitelists-3.10.0-327.4.5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821757" comment="kernel-debug-3.10.0-327.4.5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821760" comment="kernel-doc-3.10.0-327.4.5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821761" comment="kernel-headers-3.10.0-327.4.5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821762" comment="kernel-tools-3.10.0-327.4.5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821763" comment="kernel-tools-libs-3.10.0-327.4.5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821765" comment="perf-3.10.0-327.4.5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821766" comment="python-perf-3.10.0-327.4.5.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:270" version="1" class="patch">
	<metadata>
		<title>security update for java-1.6.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0067.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0067.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0402">CVE-2016-0402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0448">CVE-2016-0448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0466">CVE-2016-0466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0483">CVE-2016-0483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0494">CVE-2016-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821767" comment="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821768" comment="java-1.6.0-openjdk-demo-1.6.0.38-1.13.10.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821769" comment="java-1.6.0-openjdk-devel-1.6.0.38-1.13.10.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821770" comment="java-1.6.0-openjdk-javadoc-1.6.0.38-1.13.10.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821771" comment="java-1.6.0-openjdk-src-1.6.0.38-1.13.10.0.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:271" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0071.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0071.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1930">CVE-2016-1930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1935">CVE-2016-1935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821772" comment="firefox-38.6.0-1.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:272" version="1" class="patch">
	<metadata>
		<title>security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0073.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0073.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8704">CVE-2015-8704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821773" comment="bind-9.9.4-29.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821774" comment="bind-chroot-9.9.4-29.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821775" comment="bind-devel-9.9.4-29.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821776" comment="bind-libs-9.9.4-29.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821777" comment="bind-libs-lite-9.9.4-29.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821778" comment="bind-license-9.9.4-29.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821779" comment="bind-lite-devel-9.9.4-29.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821780" comment="bind-pkcs11-9.9.4-29.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821781" comment="bind-pkcs11-devel-9.9.4-29.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821782" comment="bind-pkcs11-libs-9.9.4-29.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821783" comment="bind-pkcs11-utils-9.9.4-29.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821784" comment="bind-sdb-9.9.4-29.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821785" comment="bind-sdb-chroot-9.9.4-29.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821786" comment="bind-utils-9.9.4-29.el7_2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:273" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0083.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0083.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821787" comment="libcacard-1.5.3-105.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821788" comment="libcacard-devel-1.5.3-105.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821789" comment="libcacard-tools-1.5.3-105.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821790" comment="qemu-img-1.5.3-105.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821791" comment="qemu-kvm-1.5.3-105.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821792" comment="qemu-kvm-common-1.5.3-105.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821793" comment="qemu-kvm-tools-1.5.3-105.el7_2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:274" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5229" ref_url="https://www.suse.com/security/cve/CVE-2015-5229/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0176.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0176.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5229/">CVE-2015-5229 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5229">CVE-2015-5229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7547">CVE-2015-7547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821794" comment="glibc-2.17-106.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821795" comment="glibc-common-2.17-106.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821796" comment="glibc-devel-2.17-106.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821797" comment="glibc-headers-2.17-106.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821798" comment="glibc-static-2.17-106.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821799" comment="glibc-utils-2.17-106.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821800" comment="nscd-2.17-106.el7_2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:275" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0185.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0185.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5157">CVE-2015-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7872">CVE-2015-7872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821801" comment="kernel-3.10.0-327.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821802" comment="kernel-abi-whitelists-3.10.0-327.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821803" comment="kernel-debug-3.10.0-327.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821806" comment="kernel-doc-3.10.0-327.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821807" comment="kernel-headers-3.10.0-327.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821808" comment="kernel-tools-3.10.0-327.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821809" comment="kernel-tools-libs-3.10.0-327.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821811" comment="perf-3.10.0-327.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821812" comment="python-perf-3.10.0-327.10.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:276" version="1" class="patch">
	<metadata>
		<title>security update for sos (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-7529" ref_url="https://www.suse.com/security/cve/CVE-2015-7529/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0188.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0188.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7529/">CVE-2015-7529 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7529">CVE-2015-7529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821813" comment="sos-3.2-35.el7_2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:277" version="1" class="patch">
	<metadata>
		<title>security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0189.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0189.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3256">CVE-2015-3256 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821814" comment="polkit-0.112-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821815" comment="polkit-devel-0.112-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821816" comment="polkit-docs-0.112-6.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:278" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521/" source="CVE"/>
		<reference ref_id="CVE-2016-1522" ref_url="https://www.suse.com/security/cve/CVE-2016-1522/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0197.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0197.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1521">CVE-2016-1521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1522/">CVE-2016-1522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1522">CVE-2016-1522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1523">CVE-2016-1523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821817" comment="firefox-38.6.1-1.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:279" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0741" ref_url="https://www.suse.com/security/cve/CVE-2016-0741/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0204.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0204.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0741/">CVE-2016-0741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0741">CVE-2016-0741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821818" comment="389-ds-base-1.3.4.0-26.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821819" comment="389-ds-base-devel-1.3.4.0-26.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821820" comment="389-ds-base-libs-1.3.4.0-26.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:280" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0258.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0258.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1930">CVE-2016-1930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1935">CVE-2016-1935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821821" comment="thunderbird-38.6.0-1.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:281" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0301.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0301.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821822" comment="openssl-1.0.1e-51.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821823" comment="openssl-devel-1.0.1e-51.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821824" comment="openssl-libs-1.0.1e-51.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821825" comment="openssl-perl-1.0.1e-51.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821826" comment="openssl-static-1.0.1e-51.el7_2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:282" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0346.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0346.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0773">CVE-2016-0773 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821827" comment="postgresql-9.2.15-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821828" comment="postgresql-contrib-9.2.15-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821829" comment="postgresql-devel-9.2.15-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821830" comment="postgresql-docs-9.2.15-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821831" comment="postgresql-libs-9.2.15-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821832" comment="postgresql-plperl-9.2.15-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821833" comment="postgresql-plpython-9.2.15-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821834" comment="postgresql-pltcl-9.2.15-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821835" comment="postgresql-server-9.2.15-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821836" comment="postgresql-test-9.2.15-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821837" comment="postgresql-upgrade-9.2.15-1.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:283" version="1" class="patch">
	<metadata>
		<title>security update for nss-util (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0370.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0370.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821838" comment="nss-util-3.19.1-9.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821839" comment="nss-util-devel-3.19.1-9.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:284" version="1" class="patch">
	<metadata>
		<title>security update for openssl098e (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0704" ref_url="https://www.suse.com/security/cve/CVE-2016-0704/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0372.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0372.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0703">CVE-2016-0703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0704/">CVE-2016-0704 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0704">CVE-2016-0704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821840" comment="openssl098e-0.9.8e-29.el7_2.3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821840" comment="openssl098e-0.9.8e-29.el7_2.3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:285" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1973" ref_url="https://www.suse.com/security/cve/CVE-2016-1973/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0373.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0373.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1952">CVE-2016-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1954">CVE-2016-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1957">CVE-2016-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1958">CVE-2016-1958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1960">CVE-2016-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1961">CVE-2016-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1962">CVE-2016-1962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1964">CVE-2016-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1965">CVE-2016-1965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1966">CVE-2016-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1973/">CVE-2016-1973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1973">CVE-2016-1973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1974">CVE-2016-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1977">CVE-2016-1977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2790">CVE-2016-2790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2791">CVE-2016-2791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2792">CVE-2016-2792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2793">CVE-2016-2793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2794">CVE-2016-2794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2795">CVE-2016-2795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2796">CVE-2016-2796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2797">CVE-2016-2797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2798">CVE-2016-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2799">CVE-2016-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2800">CVE-2016-2800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2801">CVE-2016-2801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2802">CVE-2016-2802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821841" comment="firefox-38.7.0-1.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:286" version="1" class="patch">
	<metadata>
		<title>security update for libssh2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0428.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0428.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0787">CVE-2016-0787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821842" comment="libssh2-1.4.3-10.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821843" comment="libssh2-devel-1.4.3-10.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821844" comment="libssh2-docs-1.4.3-10.el7_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:287" version="1" class="patch">
	<metadata>
		<title>security update for xerces-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0729" ref_url="https://www.suse.com/security/cve/CVE-2016-0729/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0430.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0430.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0729/">CVE-2016-0729 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0729">CVE-2016-0729 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821845" comment="xerces-c-3.1.1-8.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821846" comment="xerces-c-devel-3.1.1-8.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821847" comment="xerces-c-doc-3.1.1-8.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:288" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0448.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0448.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7560">CVE-2015-7560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821848" comment="ctdb-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821849" comment="ctdb-devel-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821850" comment="ctdb-tests-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821851" comment="libsmbclient-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821852" comment="libsmbclient-devel-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821853" comment="libwbclient-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821854" comment="libwbclient-devel-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821855" comment="samba-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821856" comment="samba-client-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821857" comment="samba-client-libs-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821858" comment="samba-common-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821859" comment="samba-common-libs-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821860" comment="samba-common-tools-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821861" comment="samba-dc-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821862" comment="samba-dc-libs-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821863" comment="samba-devel-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821864" comment="samba-libs-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821865" comment="samba-pidl-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821866" comment="samba-python-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821867" comment="samba-test-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821868" comment="samba-test-devel-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821869" comment="samba-test-libs-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821870" comment="samba-vfs-glusterfs-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821871" comment="samba-winbind-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821872" comment="samba-winbind-clients-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821873" comment="samba-winbind-krb5-locator-4.2.3-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821874" comment="samba-winbind-modules-4.2.3-12.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:289" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0459.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0459.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1285">CVE-2016-1285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1286">CVE-2016-1286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821875" comment="bind-9.9.4-29.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821876" comment="bind-chroot-9.9.4-29.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821877" comment="bind-devel-9.9.4-29.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821878" comment="bind-libs-9.9.4-29.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821879" comment="bind-libs-lite-9.9.4-29.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821880" comment="bind-license-9.9.4-29.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821881" comment="bind-lite-devel-9.9.4-29.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821882" comment="bind-pkcs11-9.9.4-29.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821883" comment="bind-pkcs11-devel-9.9.4-29.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821884" comment="bind-pkcs11-libs-9.9.4-29.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821885" comment="bind-pkcs11-utils-9.9.4-29.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821886" comment="bind-sdb-9.9.4-29.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821887" comment="bind-sdb-chroot-9.9.4-29.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821888" comment="bind-utils-9.9.4-29.el7_2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:290" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0460.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0460.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1952">CVE-2016-1952 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1954">CVE-2016-1954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1957">CVE-2016-1957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1960">CVE-2016-1960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1961">CVE-2016-1961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1964">CVE-2016-1964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1966">CVE-2016-1966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1974">CVE-2016-1974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1977">CVE-2016-1977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2790">CVE-2016-2790 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2791">CVE-2016-2791 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2792">CVE-2016-2792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2793">CVE-2016-2793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2794">CVE-2016-2794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2795">CVE-2016-2795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2796">CVE-2016-2796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2797">CVE-2016-2797 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2798">CVE-2016-2798 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2799">CVE-2016-2799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2800">CVE-2016-2800 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2801">CVE-2016-2801 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2802">CVE-2016-2802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821889" comment="thunderbird-38.7.0-1.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:291" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908/" source="CVE"/>
		<reference ref_id="CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0465.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0465.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1908">CVE-2016-1908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3115">CVE-2016-3115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821890" comment="openssh-6.6.1p1-25.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821891" comment="openssh-askpass-6.6.1p1-25.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821892" comment="openssh-clients-6.6.1p1-25.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821893" comment="openssh-keycat-6.6.1p1-25.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821894" comment="openssh-ldap-6.6.1p1-25.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821895" comment="openssh-server-6.6.1p1-25.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821896" comment="openssh-server-sysvinit-6.6.1p1-25.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821897" comment="pam_ssh_agent_auth-0.9.3-9.25.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:292" version="1" class="patch">
	<metadata>
		<title>security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2315" ref_url="https://www.suse.com/security/cve/CVE-2016-2315/" source="CVE"/>
		<reference ref_id="CVE-2016-2324" ref_url="https://www.suse.com/security/cve/CVE-2016-2324/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0496.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0496.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2315/">CVE-2016-2315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2315">CVE-2016-2315 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2324/">CVE-2016-2324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2324">CVE-2016-2324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821898" comment="emacs-git-1.8.3.1-6.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821899" comment="emacs-git-el-1.8.3.1-6.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821900" comment="git-1.8.3.1-6.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821901" comment="git-all-1.8.3.1-6.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821902" comment="git-bzr-1.8.3.1-6.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821903" comment="git-cvs-1.8.3.1-6.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821904" comment="git-daemon-1.8.3.1-6.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821905" comment="git-email-1.8.3.1-6.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821906" comment="git-gui-1.8.3.1-6.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821907" comment="git-hg-1.8.3.1-6.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821908" comment="git-p4-1.8.3.1-6.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821909" comment="git-svn-1.8.3.1-6.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821910" comment="gitk-1.8.3.1-6.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821911" comment="gitweb-1.8.3.1-6.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821912" comment="perl-Git-1.8.3.1-6.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821913" comment="perl-Git-SVN-1.8.3.1-6.el7_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:293" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0512.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0512.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0636">CVE-2016-0636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821914" comment="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821915" comment="java-1.7.0-openjdk-accessibility-1.7.0.99-2.6.5.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821916" comment="java-1.7.0-openjdk-demo-1.7.0.99-2.6.5.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821917" comment="java-1.7.0-openjdk-devel-1.7.0.99-2.6.5.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821918" comment="java-1.7.0-openjdk-headless-1.7.0.99-2.6.5.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821919" comment="java-1.7.0-openjdk-javadoc-1.7.0.99-2.6.5.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821920" comment="java-1.7.0-openjdk-src-1.7.0.99-2.6.5.0.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:294" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0513.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0513.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0636">CVE-2016-0636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821921" comment="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821922" comment="java-1.8.0-openjdk-accessibility-1.8.0.77-0.b03.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.77-0.b03.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821924" comment="java-1.8.0-openjdk-debug-1.8.0.77-0.b03.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821925" comment="java-1.8.0-openjdk-demo-1.8.0.77-0.b03.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.77-0.b03.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821927" comment="java-1.8.0-openjdk-devel-1.8.0.77-0.b03.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.77-0.b03.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821929" comment="java-1.8.0-openjdk-headless-1.8.0.77-0.b03.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.77-0.b03.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821931" comment="java-1.8.0-openjdk-javadoc-1.8.0.77-0.b03.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.77-0.b03.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821933" comment="java-1.8.0-openjdk-src-1.8.0.77-0.b03.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821934" comment="java-1.8.0-openjdk-src-debug-1.8.0.77-0.b03.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:295" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0532.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0532.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8629">CVE-2015-8629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8630">CVE-2015-8630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8631">CVE-2015-8631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821935" comment="krb5-devel-1.13.2-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821936" comment="krb5-libs-1.13.2-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821937" comment="krb5-pkinit-1.13.2-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821938" comment="krb5-server-1.13.2-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821939" comment="krb5-server-ldap-1.13.2-12.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821940" comment="krb5-workstation-1.13.2-12.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:296" version="1" class="patch">
	<metadata>
		<title>security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0534.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0534.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4792">CVE-2015-4792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4802">CVE-2015-4802 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4815">CVE-2015-4815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4816">CVE-2015-4816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4819">CVE-2015-4819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4826">CVE-2015-4826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4830">CVE-2015-4830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4836">CVE-2015-4836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4858">CVE-2015-4858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4861">CVE-2015-4861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4870">CVE-2015-4870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4879">CVE-2015-4879 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4913">CVE-2015-4913 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0505">CVE-2016-0505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0546">CVE-2016-0546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0596">CVE-2016-0596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0597">CVE-2016-0597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0598">CVE-2016-0598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0600">CVE-2016-0600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0606">CVE-2016-0606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0608">CVE-2016-0608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0609">CVE-2016-0609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-0616">CVE-2016-0616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2047">CVE-2016-2047 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821941" comment="mariadb-5.5.47-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821942" comment="mariadb-bench-5.5.47-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821943" comment="mariadb-devel-5.5.47-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821944" comment="mariadb-embedded-5.5.47-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821945" comment="mariadb-embedded-devel-5.5.47-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821946" comment="mariadb-libs-5.5.47-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821947" comment="mariadb-server-5.5.47-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821948" comment="mariadb-test-5.5.47-1.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:297" version="1" class="patch">
	<metadata>
		<title>security update for graphite2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521/" source="CVE"/>
		<reference ref_id="CVE-2016-1522" ref_url="https://www.suse.com/security/cve/CVE-2016-1522/" source="CVE"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="CVE-2016-1526" ref_url="https://www.suse.com/security/cve/CVE-2016-1526/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0594.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0594.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1521">CVE-2016-1521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1522/">CVE-2016-1522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1522">CVE-2016-1522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1523">CVE-2016-1523 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1526/">CVE-2016-1526 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1526">CVE-2016-1526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821949" comment="graphite2-1.3.6-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821950" comment="graphite2-devel-1.3.6-1.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:298" version="1" class="patch">
	<metadata>
		<title>security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2114" ref_url="https://www.suse.com/security/cve/CVE-2016-2114/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0612.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0612.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5370">CVE-2015-5370 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2110">CVE-2016-2110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2111">CVE-2016-2111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2112">CVE-2016-2112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2113">CVE-2016-2113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2114/">CVE-2016-2114 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2114">CVE-2016-2114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2115">CVE-2016-2115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2118">CVE-2016-2118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009821951" comment="ctdb-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821952" comment="ctdb-devel-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821953" comment="ctdb-tests-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821954" comment="ipa-admintools-4.2.0-15.el7_2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821955" comment="ipa-client-4.2.0-15.el7_2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821956" comment="ipa-python-4.2.0-15.el7_2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821957" comment="ipa-server-4.2.0-15.el7_2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821958" comment="ipa-server-dns-4.2.0-15.el7_2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821959" comment="ipa-server-trust-ad-4.2.0-15.el7_2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821960" comment="ldb-tools-1.1.25-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821961" comment="libldb-1.1.25-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821962" comment="libldb-devel-1.1.25-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821963" comment="libsmbclient-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821964" comment="libsmbclient-devel-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821965" comment="libtalloc-2.1.5-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821966" comment="libtalloc-devel-2.1.5-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821967" comment="libtdb-1.3.8-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821968" comment="libtdb-devel-1.3.8-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821969" comment="libtevent-0.9.26-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821970" comment="libtevent-devel-0.9.26-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821971" comment="libwbclient-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821972" comment="libwbclient-devel-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821973" comment="openchange-2.0-10.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821974" comment="openchange-client-2.0-10.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821975" comment="openchange-devel-2.0-10.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821976" comment="openchange-devel-docs-2.0-10.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821977" comment="pyldb-1.1.25-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821978" comment="pyldb-devel-1.1.25-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821979" comment="pytalloc-2.1.5-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821980" comment="pytalloc-devel-2.1.5-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821981" comment="python-tdb-1.3.8-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821982" comment="python-tevent-0.9.26-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821983" comment="samba-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821984" comment="samba-client-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821985" comment="samba-client-libs-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821986" comment="samba-common-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821987" comment="samba-common-libs-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821988" comment="samba-common-tools-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821989" comment="samba-dc-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821990" comment="samba-dc-libs-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821991" comment="samba-devel-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821992" comment="samba-libs-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821993" comment="samba-pidl-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821994" comment="samba-python-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821995" comment="samba-test-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821996" comment="samba-test-devel-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821997" comment="samba-test-libs-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821998" comment="samba-vfs-glusterfs-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009821999" comment="samba-winbind-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822000" comment="samba-winbind-clients-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822001" comment="samba-winbind-krb5-locator-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822002" comment="samba-winbind-modules-4.2.10-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822003" comment="tdb-tools-1.3.8-1.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:299" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0650.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0650.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0695">CVE-2016-0695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3425">CVE-2016-3425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3426">CVE-2016-3426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822004" comment="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822005" comment="java-1.8.0-openjdk-accessibility-1.8.0.91-0.b14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822006" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.91-0.b14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822007" comment="java-1.8.0-openjdk-debug-1.8.0.91-0.b14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822008" comment="java-1.8.0-openjdk-demo-1.8.0.91-0.b14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822009" comment="java-1.8.0-openjdk-demo-debug-1.8.0.91-0.b14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822010" comment="java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822011" comment="java-1.8.0-openjdk-devel-debug-1.8.0.91-0.b14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822012" comment="java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822013" comment="java-1.8.0-openjdk-javadoc-1.8.0.91-0.b14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822014" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.91-0.b14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822015" comment="java-1.8.0-openjdk-src-1.8.0.91-0.b14.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822016" comment="java-1.8.0-openjdk-src-debug-1.8.0.91-0.b14.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:300" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0676.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0676.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0695">CVE-2016-0695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3425">CVE-2016-3425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822017" comment="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822018" comment="java-1.7.0-openjdk-accessibility-1.7.0.101-2.6.6.1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822019" comment="java-1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822020" comment="java-1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822021" comment="java-1.7.0-openjdk-headless-1.7.0.101-2.6.6.1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822022" comment="java-1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822023" comment="java-1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:301" version="1" class="patch">
	<metadata>
		<title>security update for nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0685.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0685.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1978">CVE-2016-1978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1979">CVE-2016-1979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822024" comment="nspr-4.11.0-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822025" comment="nspr-devel-4.11.0-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822026" comment="nss-3.21.0-9.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822027" comment="nss-devel-3.21.0-9.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822028" comment="nss-pkcs11-devel-3.21.0-9.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822029" comment="nss-softokn-3.16.2.3-14.2.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822030" comment="nss-softokn-devel-3.16.2.3-14.2.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822031" comment="nss-softokn-freebl-3.16.2.3-14.2.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822032" comment="nss-softokn-freebl-devel-3.16.2.3-14.2.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822033" comment="nss-sysinit-3.21.0-9.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822034" comment="nss-tools-3.21.0-9.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822035" comment="nss-util-3.21.0-2.2.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822036" comment="nss-util-devel-3.21.0-2.2.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:302" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2806" ref_url="https://www.suse.com/security/cve/CVE-2016-2806/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0695.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0695.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2805">CVE-2016-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2806/">CVE-2016-2806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2806">CVE-2016-2806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2807">CVE-2016-2807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2808">CVE-2016-2808 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2814">CVE-2016-2814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822037" comment="firefox-45.1.0-1.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:303" version="1" class="patch">
	<metadata>
		<title>security update for mercurial (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-3068" ref_url="https://www.suse.com/security/cve/CVE-2016-3068/" source="CVE"/>
		<reference ref_id="CVE-2016-3069" ref_url="https://www.suse.com/security/cve/CVE-2016-3069/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0706.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0706.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3068/">CVE-2016-3068 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3068">CVE-2016-3068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3069/">CVE-2016-3069 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3069">CVE-2016-3069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822038" comment="emacs-mercurial-2.6.2-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822039" comment="emacs-mercurial-el-2.6.2-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822040" comment="mercurial-2.6.2-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822041" comment="mercurial-hgk-2.6.2-6.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:304" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2108" ref_url="https://www.suse.com/security/cve/CVE-2016-2108/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2842" ref_url="https://www.suse.com/security/cve/CVE-2016-2842/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0722.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0722.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0799">CVE-2016-0799 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2107">CVE-2016-2107 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2108/">CVE-2016-2108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2108">CVE-2016-2108 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2842/">CVE-2016-2842 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2842">CVE-2016-2842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822042" comment="openssl-1.0.1e-51.el7_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822043" comment="openssl-devel-1.0.1e-51.el7_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822044" comment="openssl-libs-1.0.1e-51.el7_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822045" comment="openssl-perl-1.0.1e-51.el7_2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822046" comment="openssl-static-1.0.1e-51.el7_2.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:305" version="1" class="patch">
	<metadata>
		<title>security update for java-1.6.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0723.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0723.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0686">CVE-2016-0686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0687">CVE-2016-0687 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0695">CVE-2016-0695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3425">CVE-2016-3425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3427">CVE-2016-3427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822047" comment="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822048" comment="java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822049" comment="java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822050" comment="java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822051" comment="java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:306" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0724.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0724.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3710">CVE-2016-3710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822052" comment="libcacard-1.5.3-105.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822053" comment="libcacard-devel-1.5.3-105.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822054" comment="libcacard-tools-1.5.3-105.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822055" comment="qemu-img-1.5.3-105.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822056" comment="qemu-kvm-1.5.3-105.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822057" comment="qemu-kvm-common-1.5.3-105.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822058" comment="qemu-kvm-tools-1.5.3-105.el7_2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:307" version="1" class="patch">
	<metadata>
		<title>security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:0726.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:0726.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3714">CVE-2016-3714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3715">CVE-2016-3715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3716">CVE-2016-3716 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3717">CVE-2016-3717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3718">CVE-2016-3718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822059" comment="ImageMagick-6.7.8.9-13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822060" comment="ImageMagick-c++-6.7.8.9-13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822061" comment="ImageMagick-c++-devel-6.7.8.9-13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822062" comment="ImageMagick-devel-6.7.8.9-13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822063" comment="ImageMagick-doc-6.7.8.9-13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822064" comment="ImageMagick-perl-6.7.8.9-13.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:308" version="1" class="patch">
	<metadata>
		<title>security update for pcre (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-2328" ref_url="https://www.suse.com/security/cve/CVE-2015-2328/" source="CVE"/>
		<reference ref_id="CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217/" source="CVE"/>
		<reference ref_id="CVE-2015-5073" ref_url="https://www.suse.com/security/cve/CVE-2015-5073/" source="CVE"/>
		<reference ref_id="CVE-2015-8385" ref_url="https://www.suse.com/security/cve/CVE-2015-8385/" source="CVE"/>
		<reference ref_id="CVE-2015-8386" ref_url="https://www.suse.com/security/cve/CVE-2015-8386/" source="CVE"/>
		<reference ref_id="CVE-2015-8388" ref_url="https://www.suse.com/security/cve/CVE-2015-8388/" source="CVE"/>
		<reference ref_id="CVE-2015-8391" ref_url="https://www.suse.com/security/cve/CVE-2015-8391/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1025.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1025.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2328/">CVE-2015-2328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2328">CVE-2015-2328 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3217">CVE-2015-3217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5073/">CVE-2015-5073 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5073">CVE-2015-5073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8385/">CVE-2015-8385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8385">CVE-2015-8385 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8386/">CVE-2015-8386 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8386">CVE-2015-8386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8388/">CVE-2015-8388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8388">CVE-2015-8388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8391/">CVE-2015-8391 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8391">CVE-2015-8391 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3191">CVE-2016-3191 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822065" comment="pcre-8.32-15.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822066" comment="pcre-devel-8.32-15.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822067" comment="pcre-static-8.32-15.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822068" comment="pcre-tools-8.32-15.el7_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:309" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1033.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1033.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0758">CVE-2016-0758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822069" comment="kernel-3.10.0-327.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822070" comment="kernel-abi-whitelists-3.10.0-327.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822071" comment="kernel-debug-3.10.0-327.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822074" comment="kernel-doc-3.10.0-327.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822075" comment="kernel-headers-3.10.0-327.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822076" comment="kernel-tools-3.10.0-327.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822077" comment="kernel-tools-libs-3.10.0-327.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822079" comment="perf-3.10.0-327.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822080" comment="python-perf-3.10.0-327.18.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:310" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1041.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1041.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2805">CVE-2016-2805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2807">CVE-2016-2807 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822081" comment="thunderbird-38.8.0-1.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:311" version="1" class="patch">
	<metadata>
		<title>security update for libndp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-3698" ref_url="https://www.suse.com/security/cve/CVE-2016-3698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1086.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1086.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3698/">CVE-2016-3698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3698">CVE-2016-3698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822082" comment="libndp-1.2-6.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822083" comment="libndp-devel-1.2-6.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:312" version="1" class="patch">
	<metadata>
		<title>security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4052" ref_url="https://www.suse.com/security/cve/CVE-2016-4052/" source="CVE"/>
		<reference ref_id="CVE-2016-4053" ref_url="https://www.suse.com/security/cve/CVE-2016-4053/" source="CVE"/>
		<reference ref_id="CVE-2016-4054" ref_url="https://www.suse.com/security/cve/CVE-2016-4054/" source="CVE"/>
		<reference ref_id="CVE-2016-4553" ref_url="https://www.suse.com/security/cve/CVE-2016-4553/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<reference ref_id="CVE-2016-4555" ref_url="https://www.suse.com/security/cve/CVE-2016-4555/" source="CVE"/>
		<reference ref_id="CVE-2016-4556" ref_url="https://www.suse.com/security/cve/CVE-2016-4556/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1139.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1139.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4051">CVE-2016-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4052/">CVE-2016-4052 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4052">CVE-2016-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4053/">CVE-2016-4053 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4053">CVE-2016-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4054/">CVE-2016-4054 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4054">CVE-2016-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4553/">CVE-2016-4553 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4553">CVE-2016-4553 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4554">CVE-2016-4554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4555/">CVE-2016-4555 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4555">CVE-2016-4555 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4556/">CVE-2016-4556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4556">CVE-2016-4556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822084" comment="squid-3.3.8-26.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822085" comment="squid-sysvinit-3.3.8-26.el7_2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:313" version="1" class="patch">
	<metadata>
		<title>security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1141.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1141.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7979">CVE-2015-7979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1547">CVE-2016-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1548">CVE-2016-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1550">CVE-2016-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2518">CVE-2016-2518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822086" comment="ntp-4.2.6p5-22.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822087" comment="ntp-doc-4.2.6p5-22.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822088" comment="ntp-perl-4.2.6p5-22.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822089" comment="ntpdate-4.2.6p5-22.el7_2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822090" comment="sntp-4.2.6p5-22.el7_2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:314" version="1" class="patch">
	<metadata>
		<title>security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749/" source="CVE"/>
		<reference ref_id="CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1205.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1205.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0749">CVE-2016-0749 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2150">CVE-2016-2150 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822091" comment="spice-server-0.12.4-15.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822092" comment="spice-server-devel-0.12.4-15.el7_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:315" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1217.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1217.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2818">CVE-2016-2818 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2819">CVE-2016-2819 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2821">CVE-2016-2821 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2822">CVE-2016-2822 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2828">CVE-2016-2828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2831">CVE-2016-2831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822093" comment="firefox-45.2.0-1.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:316" version="1" class="patch">
	<metadata>
		<title>security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8895" ref_url="https://www.suse.com/security/cve/CVE-2015-8895/" source="CVE"/>
		<reference ref_id="CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896/" source="CVE"/>
		<reference ref_id="CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897/" source="CVE"/>
		<reference ref_id="CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898/" source="CVE"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="CVE-2016-5239" ref_url="https://www.suse.com/security/cve/CVE-2016-5239/" source="CVE"/>
		<reference ref_id="CVE-2016-5240" ref_url="https://www.suse.com/security/cve/CVE-2016-5240/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1237.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1237.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8895/">CVE-2015-8895 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8895">CVE-2015-8895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8896">CVE-2015-8896 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8897">CVE-2015-8897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8898">CVE-2015-8898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5118">CVE-2016-5118 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5239/">CVE-2016-5239 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5239">CVE-2016-5239 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5240/">CVE-2016-5240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5240">CVE-2016-5240 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822094" comment="ImageMagick-6.7.8.9-15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822095" comment="ImageMagick-c++-6.7.8.9-15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822096" comment="ImageMagick-c++-devel-6.7.8.9-15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822097" comment="ImageMagick-devel-6.7.8.9-15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822098" comment="ImageMagick-doc-6.7.8.9-15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822099" comment="ImageMagick-perl-6.7.8.9-15.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:317" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767/" source="CVE"/>
		<reference ref_id="CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1277.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1277.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8767">CVE-2015-8767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4565">CVE-2016-4565 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822100" comment="kernel-3.10.0-327.22.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822101" comment="kernel-abi-whitelists-3.10.0-327.22.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822102" comment="kernel-debug-3.10.0-327.22.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822105" comment="kernel-doc-3.10.0-327.22.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822106" comment="kernel-headers-3.10.0-327.22.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822107" comment="kernel-tools-3.10.0-327.22.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822108" comment="kernel-tools-libs-3.10.0-327.22.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822110" comment="perf-3.10.0-327.22.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822111" comment="python-perf-3.10.0-327.22.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:318" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4447" ref_url="https://www.suse.com/security/cve/CVE-2016-4447/" source="CVE"/>
		<reference ref_id="CVE-2016-4448" ref_url="https://www.suse.com/security/cve/CVE-2016-4448/" source="CVE"/>
		<reference ref_id="CVE-2016-4449" ref_url="https://www.suse.com/security/cve/CVE-2016-4449/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1292.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1292.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1762">CVE-2016-1762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1833">CVE-2016-1833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1834">CVE-2016-1834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1835">CVE-2016-1835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1836">CVE-2016-1836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1837">CVE-2016-1837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1838">CVE-2016-1838 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1839">CVE-2016-1839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1840">CVE-2016-1840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3627">CVE-2016-3627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3705">CVE-2016-3705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4447/">CVE-2016-4447 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4447">CVE-2016-4447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4448/">CVE-2016-4448 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4448">CVE-2016-4448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4449/">CVE-2016-4449 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4449">CVE-2016-4449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822112" comment="libxml2-2.9.1-6.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822113" comment="libxml2-devel-2.9.1-6.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822114" comment="libxml2-python-2.9.1-6.el7_2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822115" comment="libxml2-static-2.9.1-6.el7_2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:319" version="1" class="patch">
	<metadata>
		<title>security update for setroubleshoot (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-4444" ref_url="https://www.suse.com/security/cve/CVE-2016-4444/" source="CVE"/>
		<reference ref_id="CVE-2016-4446" ref_url="https://www.suse.com/security/cve/CVE-2016-4446/" source="CVE"/>
		<reference ref_id="CVE-2016-4989" ref_url="https://www.suse.com/security/cve/CVE-2016-4989/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1293.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1293.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4444/">CVE-2016-4444 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4444">CVE-2016-4444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4446/">CVE-2016-4446 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4446">CVE-2016-4446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4989/">CVE-2016-4989 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4989">CVE-2016-4989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822116" comment="setroubleshoot-3.2.24-4.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822117" comment="setroubleshoot-plugins-3.0.59-2.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822118" comment="setroubleshoot-server-3.2.24-4.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:320" version="1" class="patch">
	<metadata>
		<title>security update for ocaml (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8869" ref_url="https://www.suse.com/security/cve/CVE-2015-8869/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1296.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1296.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8869/">CVE-2015-8869 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8869">CVE-2015-8869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822119" comment="ocaml-4.01.0-22.7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822120" comment="ocaml-camlp4-4.01.0-22.7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822121" comment="ocaml-camlp4-devel-4.01.0-22.7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822122" comment="ocaml-compiler-libs-4.01.0-22.7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822123" comment="ocaml-docs-4.01.0-22.7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822124" comment="ocaml-emacs-4.01.0-22.7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822125" comment="ocaml-labltk-4.01.0-22.7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822126" comment="ocaml-labltk-devel-4.01.0-22.7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822127" comment="ocaml-ocamldoc-4.01.0-22.7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822128" comment="ocaml-runtime-4.01.0-22.7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822129" comment="ocaml-source-4.01.0-22.7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822130" comment="ocaml-x11-4.01.0-22.7.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:321" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1392.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1392.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2818">CVE-2016-2818 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822131" comment="thunderbird-45.2-1.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:322" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1422.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1422.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5387">CVE-2016-5387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822132" comment="httpd-2.4.6-40.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822133" comment="httpd-devel-2.4.6-40.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822134" comment="httpd-manual-2.4.6-40.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822135" comment="httpd-tools-2.4.6-40.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822136" comment="mod_ldap-2.4.6-40.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822137" comment="mod_proxy_html-2.4.6-40.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822138" comment="mod_session-2.4.6-40.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822139" comment="mod_ssl-2.4.6-40.el7_2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:323" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3587" ref_url="https://www.suse.com/security/cve/CVE-2016-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1458.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1458.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3458">CVE-2016-3458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3500">CVE-2016-3500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3508">CVE-2016-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3550">CVE-2016-3550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3587/">CVE-2016-3587 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3587">CVE-2016-3587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3598">CVE-2016-3598 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3606">CVE-2016-3606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3610">CVE-2016-3610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822140" comment="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822141" comment="java-1.8.0-openjdk-accessibility-1.8.0.101-3.b13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.101-3.b13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822143" comment="java-1.8.0-openjdk-debug-1.8.0.101-3.b13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822144" comment="java-1.8.0-openjdk-demo-1.8.0.101-3.b13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.101-3.b13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822146" comment="java-1.8.0-openjdk-devel-1.8.0.101-3.b13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.101-3.b13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822148" comment="java-1.8.0-openjdk-headless-1.8.0.101-3.b13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.101-3.b13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822150" comment="java-1.8.0-openjdk-javadoc-1.8.0.101-3.b13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.101-3.b13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822152" comment="java-1.8.0-openjdk-src-1.8.0.101-3.b13.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822153" comment="java-1.8.0-openjdk-src-debug-1.8.0.101-3.b13.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:324" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1486.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1486.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2119">CVE-2016-2119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822154" comment="ctdb-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822155" comment="ctdb-devel-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822156" comment="ctdb-tests-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822157" comment="libsmbclient-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822158" comment="libsmbclient-devel-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822159" comment="libwbclient-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822160" comment="libwbclient-devel-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822161" comment="samba-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822162" comment="samba-client-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822163" comment="samba-client-libs-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822164" comment="samba-common-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822165" comment="samba-common-libs-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822166" comment="samba-common-tools-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822167" comment="samba-dc-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822168" comment="samba-dc-libs-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822169" comment="samba-devel-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822170" comment="samba-libs-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822171" comment="samba-pidl-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822172" comment="samba-python-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822173" comment="samba-test-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822174" comment="samba-test-devel-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822175" comment="samba-test-libs-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822176" comment="samba-vfs-glusterfs-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822177" comment="samba-winbind-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822178" comment="samba-winbind-clients-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822179" comment="samba-winbind-krb5-locator-4.2.10-7.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822180" comment="samba-winbind-modules-4.2.10-7.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:325" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1504.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1504.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3458">CVE-2016-3458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3500">CVE-2016-3500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3508">CVE-2016-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3550">CVE-2016-3550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3598">CVE-2016-3598 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3606">CVE-2016-3606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3610">CVE-2016-3610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822181" comment="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822182" comment="java-1.7.0-openjdk-accessibility-1.7.0.111-2.6.7.2.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822183" comment="java-1.7.0-openjdk-demo-1.7.0.111-2.6.7.2.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822184" comment="java-1.7.0-openjdk-devel-1.7.0.111-2.6.7.2.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822185" comment="java-1.7.0-openjdk-headless-1.7.0.111-2.6.7.2.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822186" comment="java-1.7.0-openjdk-javadoc-1.7.0.111-2.6.7.2.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822187" comment="java-1.7.0-openjdk-src-1.7.0.111-2.6.7.2.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:326" version="1" class="patch">
	<metadata>
		<title>security update for golang (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5386" ref_url="https://www.suse.com/security/cve/CVE-2016-5386/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1538.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1538.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5386/">CVE-2016-5386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5386">CVE-2016-5386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822188" comment="golang-1.6.3-1.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822189" comment="golang-bin-1.6.3-1.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822190" comment="golang-docs-1.6.3-1.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822191" comment="golang-misc-1.6.3-1.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822192" comment="golang-src-1.6.3-1.el7_2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822193" comment="golang-tests-1.6.3-1.el7_2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:327" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8660" ref_url="https://www.suse.com/security/cve/CVE-2015-8660/" source="CVE"/>
		<reference ref_id="CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143/" source="CVE"/>
		<reference ref_id="CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1539.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1539.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8660/">CVE-2015-8660 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8660">CVE-2015-8660 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2143">CVE-2016-2143 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4470">CVE-2016-4470 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822194" comment="kernel-3.10.0-327.28.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822195" comment="kernel-abi-whitelists-3.10.0-327.28.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822196" comment="kernel-debug-3.10.0-327.28.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822199" comment="kernel-doc-3.10.0-327.28.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822200" comment="kernel-headers-3.10.0-327.28.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822201" comment="kernel-tools-3.10.0-327.28.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822202" comment="kernel-tools-libs-3.10.0-327.28.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822204" comment="perf-3.10.0-327.28.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822205" comment="python-perf-3.10.0-327.28.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:328" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9330" ref_url="https://www.suse.com/security/cve/CVE-2014-9330/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8668" ref_url="https://www.suse.com/security/cve/CVE-2015-8668/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="CVE-2015-8784" ref_url="https://www.suse.com/security/cve/CVE-2015-8784/" source="CVE"/>
		<reference ref_id="CVE-2016-3632" ref_url="https://www.suse.com/security/cve/CVE-2016-3632/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-3991" ref_url="https://www.suse.com/security/cve/CVE-2016-3991/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1546.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1546.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8127">CVE-2014-8127 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8129">CVE-2014-8129 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8130">CVE-2014-8130 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9330/">CVE-2014-9330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9330">CVE-2014-9330 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9655">CVE-2014-9655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1547">CVE-2015-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7554">CVE-2015-7554 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8665">CVE-2015-8665 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8668/">CVE-2015-8668 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8668">CVE-2015-8668 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8683">CVE-2015-8683 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8781">CVE-2015-8781 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8782">CVE-2015-8782 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8783">CVE-2015-8783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-8784/">CVE-2015-8784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8784">CVE-2015-8784 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3632/">CVE-2016-3632 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3632">CVE-2016-3632 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3945">CVE-2016-3945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3990">CVE-2016-3990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3991/">CVE-2016-3991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3991">CVE-2016-3991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5320">CVE-2016-5320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822206" comment="libtiff-4.0.3-25.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822207" comment="libtiff-devel-4.0.3-25.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822208" comment="libtiff-static-4.0.3-25.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822209" comment="libtiff-tools-4.0.3-25.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:329" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1551.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1551.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2830">CVE-2016-2830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2836">CVE-2016-2836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2837">CVE-2016-2837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2838">CVE-2016-2838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5252">CVE-2016-5252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5254">CVE-2016-5254 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5258">CVE-2016-5258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5259">CVE-2016-5259 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5262">CVE-2016-5262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5263">CVE-2016-5263 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5264">CVE-2016-5264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5265">CVE-2016-5265 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822210" comment="firefox-45.3.0-1.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:330" version="1" class="patch">
	<metadata>
		<title>security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647/" source="CVE"/>
		<reference ref_id="CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666/" source="CVE"/>
		<reference ref_id="CVE-2016-3452" ref_url="https://www.suse.com/security/cve/CVE-2016-3452/" source="CVE"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-5444" ref_url="https://www.suse.com/security/cve/CVE-2016-5444/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1602.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1602.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0640">CVE-2016-0640 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0641">CVE-2016-0641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0643">CVE-2016-0643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0644">CVE-2016-0644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0646">CVE-2016-0646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0647">CVE-2016-0647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0648">CVE-2016-0648 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0649">CVE-2016-0649 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0650">CVE-2016-0650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0666">CVE-2016-0666 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3452/">CVE-2016-3452 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3452">CVE-2016-3452 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3477">CVE-2016-3477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3521">CVE-2016-3521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3615">CVE-2016-3615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5440">CVE-2016-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5444/">CVE-2016-5444 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5444">CVE-2016-5444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822211" comment="mariadb-5.5.50-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822212" comment="mariadb-bench-5.5.50-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822213" comment="mariadb-devel-5.5.50-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822214" comment="mariadb-embedded-5.5.50-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822215" comment="mariadb-embedded-devel-5.5.50-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822216" comment="mariadb-libs-5.5.50-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822217" comment="mariadb-server-5.5.50-1.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822218" comment="mariadb-test-5.5.50-1.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:331" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1606.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1606.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5126">CVE-2016-5126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5403">CVE-2016-5403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822219" comment="libcacard-1.5.3-105.el7_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822220" comment="libcacard-devel-1.5.3-105.el7_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822221" comment="libcacard-tools-1.5.3-105.el7_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822222" comment="qemu-img-1.5.3-105.el7_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822223" comment="qemu-kvm-1.5.3-105.el7_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822224" comment="qemu-kvm-common-1.5.3-105.el7_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822225" comment="qemu-kvm-tools-1.5.3-105.el7_2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:332" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5385" ref_url="https://www.suse.com/security/cve/CVE-2016-5385/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1613.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1613.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5385/">CVE-2016-5385 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5385">CVE-2016-5385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822226" comment="php-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822227" comment="php-bcmath-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822228" comment="php-cli-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822229" comment="php-common-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822230" comment="php-dba-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822231" comment="php-devel-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822232" comment="php-embedded-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822233" comment="php-enchant-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822234" comment="php-fpm-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822235" comment="php-gd-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822236" comment="php-intl-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822237" comment="php-ldap-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822238" comment="php-mbstring-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822239" comment="php-mysql-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822240" comment="php-mysqlnd-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822241" comment="php-odbc-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822242" comment="php-pdo-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822243" comment="php-pgsql-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822244" comment="php-process-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822245" comment="php-pspell-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822246" comment="php-recode-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822247" comment="php-snmp-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822248" comment="php-soap-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822249" comment="php-xml-5.4.16-36.3.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822250" comment="php-xmlrpc-5.4.16-36.3.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:333" version="1" class="patch">
	<metadata>
		<title>security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1626.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1626.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000110">CVE-2016-1000110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822251" comment="python-2.7.5-38.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822252" comment="python-debug-2.7.5-38.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822253" comment="python-devel-2.7.5-38.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822254" comment="python-libs-2.7.5-38.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822255" comment="python-test-2.7.5-38.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822256" comment="python-tools-2.7.5-38.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822257" comment="tkinter-2.7.5-38.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:334" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<description>
This security update provides a functional equivalent of RHSA-2016:1633.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1633.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822258" comment="kernel-3.10.0-327.28.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822259" comment="kernel-abi-whitelists-3.10.0-327.28.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822260" comment="kernel-debug-3.10.0-327.28.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822263" comment="kernel-doc-3.10.0-327.28.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822264" comment="kernel-headers-3.10.0-327.28.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822265" comment="kernel-tools-3.10.0-327.28.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822266" comment="kernel-tools-libs-3.10.0-327.28.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822268" comment="perf-3.10.0-327.28.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822269" comment="python-perf-3.10.0-327.28.3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:335" version="1" class="patch">
	<metadata>
		<title>security update for java-1.6.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1776.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1776.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3458">CVE-2016-3458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3500">CVE-2016-3500 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3508">CVE-2016-3508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3550">CVE-2016-3550 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3606">CVE-2016-3606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822270" comment="java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822271" comment="java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.5.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822272" comment="java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.5.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822273" comment="java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.5.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822274" comment="java-1.6.0-openjdk-src-1.6.0.40-1.13.12.5.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:336" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5404" ref_url="https://www.suse.com/security/cve/CVE-2016-5404/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1797.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1797.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5404/">CVE-2016-5404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5404">CVE-2016-5404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822275" comment="ipa-admintools-4.2.0-15.el7_2.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822276" comment="ipa-client-4.2.0-15.el7_2.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822277" comment="ipa-python-4.2.0-15.el7_2.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822278" comment="ipa-server-4.2.0-15.el7_2.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822279" comment="ipa-server-dns-4.2.0-15.el7_2.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822280" comment="ipa-server-trust-ad-4.2.0-15.el7_2.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:337" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1809.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1809.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2836">CVE-2016-2836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822281" comment="thunderbird-45.3.0-1.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:338" version="1" class="patch">
	<metadata>
		<title>security update for libarchive (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8916" ref_url="https://www.suse.com/security/cve/CVE-2015-8916/" source="CVE"/>
		<reference ref_id="CVE-2015-8917" ref_url="https://www.suse.com/security/cve/CVE-2015-8917/" source="CVE"/>
		<reference ref_id="CVE-2015-8919" ref_url="https://www.suse.com/security/cve/CVE-2015-8919/" source="CVE"/>
		<reference ref_id="CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920/" source="CVE"/>
		<reference ref_id="CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921/" source="CVE"/>
		<reference ref_id="CVE-2015-8922" ref_url="https://www.suse.com/security/cve/CVE-2015-8922/" source="CVE"/>
		<reference ref_id="CVE-2015-8923" ref_url="https://www.suse.com/security/cve/CVE-2015-8923/" source="CVE"/>
		<reference ref_id="CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924/" source="CVE"/>
		<reference ref_id="CVE-2015-8925" ref_url="https://www.suse.com/security/cve/CVE-2015-8925/" source="CVE"/>
		<reference ref_id="CVE-2015-8926" ref_url="https://www.suse.com/security/cve/CVE-2015-8926/" source="CVE"/>
		<reference ref_id="CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928/" source="CVE"/>
		<reference ref_id="CVE-2015-8930" ref_url="https://www.suse.com/security/cve/CVE-2015-8930/" source="CVE"/>
		<reference ref_id="CVE-2015-8931" ref_url="https://www.suse.com/security/cve/CVE-2015-8931/" source="CVE"/>
		<reference ref_id="CVE-2015-8932" ref_url="https://www.suse.com/security/cve/CVE-2015-8932/" source="CVE"/>
		<reference ref_id="CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934/" source="CVE"/>
		<reference ref_id="CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541/" source="CVE"/>
		<reference ref_id="CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300/" source="CVE"/>
		<reference ref_id="CVE-2016-4302" ref_url="https://www.suse.com/security/cve/CVE-2016-4302/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418/" source="CVE"/>
		<reference ref_id="CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844/" source="CVE"/>
		<reference ref_id="CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250/" source="CVE"/>
		<reference ref_id="CVE-2016-7166" ref_url="https://www.suse.com/security/cve/CVE-2016-7166/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1844.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1844.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8916/">CVE-2015-8916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8916">CVE-2015-8916 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8917/">CVE-2015-8917 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8917">CVE-2015-8917 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8919/">CVE-2015-8919 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8919">CVE-2015-8919 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8920">CVE-2015-8920 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8921">CVE-2015-8921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8922/">CVE-2015-8922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8922">CVE-2015-8922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8923/">CVE-2015-8923 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8923">CVE-2015-8923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8924">CVE-2015-8924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8925/">CVE-2015-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8925">CVE-2015-8925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8926/">CVE-2015-8926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8926">CVE-2015-8926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8928">CVE-2015-8928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8930/">CVE-2015-8930 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8930">CVE-2015-8930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8931/">CVE-2015-8931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8931">CVE-2015-8931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8932/">CVE-2015-8932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8932">CVE-2015-8932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8934">CVE-2015-8934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1541">CVE-2016-1541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4300">CVE-2016-4300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4302/">CVE-2016-4302 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4302">CVE-2016-4302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4809">CVE-2016-4809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5418">CVE-2016-5418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5844">CVE-2016-5844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6250">CVE-2016-6250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7166/">CVE-2016-7166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7166">CVE-2016-7166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822282" comment="bsdcpio-3.1.2-10.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822283" comment="bsdtar-3.1.2-10.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822284" comment="libarchive-3.1.2-10.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822285" comment="libarchive-devel-3.1.2-10.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:339" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134/" source="CVE"/>
		<reference ref_id="CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1847.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1847.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3134">CVE-2016-3134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4997">CVE-2016-4997 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822286" comment="kernel-3.10.0-327.36.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822287" comment="kernel-abi-whitelists-3.10.0-327.36.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822288" comment="kernel-debug-3.10.0-327.36.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822291" comment="kernel-doc-3.10.0-327.36.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822292" comment="kernel-headers-3.10.0-327.36.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822293" comment="kernel-tools-3.10.0-327.36.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822294" comment="kernel-tools-libs-3.10.0-327.36.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822296" comment="perf-3.10.0-327.36.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822297" comment="python-perf-3.10.0-327.36.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:340" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1912.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1912.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5250">CVE-2016-5250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5257">CVE-2016-5257 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5261">CVE-2016-5261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5270">CVE-2016-5270 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5272">CVE-2016-5272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5274">CVE-2016-5274 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5276">CVE-2016-5276 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5277">CVE-2016-5277 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5278">CVE-2016-5278 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5280">CVE-2016-5280 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5281">CVE-2016-5281 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5284">CVE-2016-5284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822298" comment="firefox-45.4.0-1.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:341" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1940.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1940.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2180">CVE-2016-2180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822299" comment="openssl-1.0.1e-51.el7_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822300" comment="openssl-devel-1.0.1e-51.el7_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822301" comment="openssl-libs-1.0.1e-51.el7_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822302" comment="openssl-perl-1.0.1e-51.el7_2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822303" comment="openssl-static-1.0.1e-51.el7_2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:342" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1944.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1944.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2776">CVE-2016-2776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822304" comment="bind-9.9.4-29.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822305" comment="bind-chroot-9.9.4-29.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822306" comment="bind-devel-9.9.4-29.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822307" comment="bind-libs-9.9.4-29.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822308" comment="bind-libs-lite-9.9.4-29.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822309" comment="bind-license-9.9.4-29.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822310" comment="bind-lite-devel-9.9.4-29.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822311" comment="bind-pkcs11-9.9.4-29.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822312" comment="bind-pkcs11-devel-9.9.4-29.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822313" comment="bind-pkcs11-libs-9.9.4-29.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822314" comment="bind-pkcs11-utils-9.9.4-29.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822315" comment="bind-sdb-9.9.4-29.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822316" comment="bind-sdb-chroot-9.9.4-29.el7_2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822317" comment="bind-utils-9.9.4-29.el7_2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:343" version="1" class="patch">
	<metadata>
		<title>security update for python-twisted-web (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1000111" ref_url="https://www.suse.com/security/cve/CVE-2016-1000111/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1978.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1978.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000111/">CVE-2016-1000111 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000111">CVE-2016-1000111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822318" comment="python-twisted-web-12.1.0-5.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:344" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:1985.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:1985.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5257">CVE-2016-5257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822319" comment="thunderbird-45.4.0-1.el7_2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:345" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-7810" ref_url="https://www.suse.com/security/cve/CVE-2014-7810/" source="CVE"/>
		<reference ref_id="CVE-2015-5346" ref_url="https://www.suse.com/security/cve/CVE-2015-5346/" source="CVE"/>
		<reference ref_id="CVE-2016-5388" ref_url="https://www.suse.com/security/cve/CVE-2016-5388/" source="CVE"/>
		<reference ref_id="CVE-2016-5425" ref_url="https://www.suse.com/security/cve/CVE-2016-5425/" source="CVE"/>
		<reference ref_id="CVE-2016-6325" ref_url="https://www.suse.com/security/cve/CVE-2016-6325/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2046.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2046.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7810/">CVE-2014-7810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7810">CVE-2014-7810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5346/">CVE-2015-5346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5346">CVE-2015-5346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5388/">CVE-2016-5388 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5388">CVE-2016-5388 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5425/">CVE-2016-5425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5425">CVE-2016-5425 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6325/">CVE-2016-6325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6325">CVE-2016-6325 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822320" comment="tomcat-7.0.54-8.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822321" comment="tomcat-admin-webapps-7.0.54-8.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822322" comment="tomcat-docs-webapp-7.0.54-8.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822323" comment="tomcat-el-2.2-api-7.0.54-8.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822324" comment="tomcat-javadoc-7.0.54-8.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822325" comment="tomcat-jsp-2.2-api-7.0.54-8.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822326" comment="tomcat-jsvc-7.0.54-8.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822327" comment="tomcat-lib-7.0.54-8.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822328" comment="tomcat-servlet-3.0-api-7.0.54-8.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822329" comment="tomcat-webapps-7.0.54-8.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:346" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-7039" ref_url="https://www.suse.com/security/cve/CVE-2016-7039/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2047.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2047.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7039/">CVE-2016-7039 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7039">CVE-2016-7039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822330" comment="kernel-3.10.0-327.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822331" comment="kernel-abi-whitelists-3.10.0-327.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822332" comment="kernel-debug-3.10.0-327.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822335" comment="kernel-doc-3.10.0-327.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822336" comment="kernel-headers-3.10.0-327.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822337" comment="kernel-tools-3.10.0-327.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822338" comment="kernel-tools-libs-3.10.0-327.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822340" comment="perf-3.10.0-327.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822341" comment="python-perf-3.10.0-327.36.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:347" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2079.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2079.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5582">CVE-2016-5582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822342" comment="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822343" comment="java-1.8.0-openjdk-accessibility-1.8.0.111-1.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822344" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.111-1.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822345" comment="java-1.8.0-openjdk-debug-1.8.0.111-1.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822346" comment="java-1.8.0-openjdk-demo-1.8.0.111-1.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822347" comment="java-1.8.0-openjdk-demo-debug-1.8.0.111-1.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822348" comment="java-1.8.0-openjdk-devel-1.8.0.111-1.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822349" comment="java-1.8.0-openjdk-devel-debug-1.8.0.111-1.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822350" comment="java-1.8.0-openjdk-headless-1.8.0.111-1.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822351" comment="java-1.8.0-openjdk-headless-debug-1.8.0.111-1.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822352" comment="java-1.8.0-openjdk-javadoc-1.8.0.111-1.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822353" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.111-1.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822354" comment="java-1.8.0-openjdk-src-1.8.0.111-1.b15.el7_2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822355" comment="java-1.8.0-openjdk-src-debug-1.8.0.111-1.b15.el7_2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:348" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2098.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2098.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5195">CVE-2016-5195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822356" comment="kernel-3.10.0-327.36.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822357" comment="kernel-abi-whitelists-3.10.0-327.36.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822358" comment="kernel-debug-3.10.0-327.36.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822361" comment="kernel-doc-3.10.0-327.36.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822362" comment="kernel-headers-3.10.0-327.36.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822363" comment="kernel-tools-3.10.0-327.36.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822364" comment="kernel-tools-libs-3.10.0-327.36.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822366" comment="perf-3.10.0-327.36.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822367" comment="python-perf-3.10.0-327.36.3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:349" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2573.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2573.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3075">CVE-2016-3075 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822368" comment="glibc-2.17-157.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822369" comment="glibc-common-2.17-157.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822370" comment="glibc-devel-2.17-157.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822371" comment="glibc-headers-2.17-157.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822372" comment="glibc-static-2.17-157.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822373" comment="glibc-utils-2.17-157.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822374" comment="nscd-2.17-157.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:350" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312/" source="CVE"/>
		<reference ref_id="CVE-2015-8374" ref_url="https://www.suse.com/security/cve/CVE-2015-8374/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2015-8746" ref_url="https://www.suse.com/security/cve/CVE-2015-8746/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2015-8844" ref_url="https://www.suse.com/security/cve/CVE-2015-8844/" source="CVE"/>
		<reference ref_id="CVE-2015-8845" ref_url="https://www.suse.com/security/cve/CVE-2015-8845/" source="CVE"/>
		<reference ref_id="CVE-2015-8956" ref_url="https://www.suse.com/security/cve/CVE-2015-8956/" source="CVE"/>
		<reference ref_id="CVE-2016-2053" ref_url="https://www.suse.com/security/cve/CVE-2016-2053/" source="CVE"/>
		<reference ref_id="CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069/" source="CVE"/>
		<reference ref_id="CVE-2016-2117" ref_url="https://www.suse.com/security/cve/CVE-2016-2117/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847/" source="CVE"/>
		<reference ref_id="CVE-2016-3070" ref_url="https://www.suse.com/security/cve/CVE-2016-3070/" source="CVE"/>
		<reference ref_id="CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156/" source="CVE"/>
		<reference ref_id="CVE-2016-3699" ref_url="https://www.suse.com/security/cve/CVE-2016-3699/" source="CVE"/>
		<reference ref_id="CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841/" source="CVE"/>
		<reference ref_id="CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569/" source="CVE"/>
		<reference ref_id="CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578/" source="CVE"/>
		<reference ref_id="CVE-2016-4581" ref_url="https://www.suse.com/security/cve/CVE-2016-4581/" source="CVE"/>
		<reference ref_id="CVE-2016-4794" ref_url="https://www.suse.com/security/cve/CVE-2016-4794/" source="CVE"/>
		<reference ref_id="CVE-2016-5412" ref_url="https://www.suse.com/security/cve/CVE-2016-5412/" source="CVE"/>
		<reference ref_id="CVE-2016-5828" ref_url="https://www.suse.com/security/cve/CVE-2016-5828/" source="CVE"/>
		<reference ref_id="CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829/" source="CVE"/>
		<reference ref_id="CVE-2016-6136" ref_url="https://www.suse.com/security/cve/CVE-2016-6136/" source="CVE"/>
		<reference ref_id="CVE-2016-6198" ref_url="https://www.suse.com/security/cve/CVE-2016-6198/" source="CVE"/>
		<reference ref_id="CVE-2016-6327" ref_url="https://www.suse.com/security/cve/CVE-2016-6327/" source="CVE"/>
		<reference ref_id="CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2574.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2574.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4312">CVE-2013-4312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8374/">CVE-2015-8374 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8374">CVE-2015-8374 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8543">CVE-2015-8543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8746/">CVE-2015-8746 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8746">CVE-2015-8746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8812">CVE-2015-8812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8844/">CVE-2015-8844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8844">CVE-2015-8844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8845/">CVE-2015-8845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8845">CVE-2015-8845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8956/">CVE-2015-8956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8956">CVE-2015-8956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2053/">CVE-2016-2053 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2053">CVE-2016-2053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2069">CVE-2016-2069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2117/">CVE-2016-2117 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2117">CVE-2016-2117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2384">CVE-2016-2384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2847">CVE-2016-2847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3070/">CVE-2016-3070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3070">CVE-2016-3070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3156">CVE-2016-3156 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3699/">CVE-2016-3699 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3699">CVE-2016-3699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3841">CVE-2016-3841 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4569">CVE-2016-4569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4578">CVE-2016-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4581/">CVE-2016-4581 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4581">CVE-2016-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4794/">CVE-2016-4794 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4794">CVE-2016-4794 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5412/">CVE-2016-5412 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5412">CVE-2016-5412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5828/">CVE-2016-5828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5828">CVE-2016-5828 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5829">CVE-2016-5829 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6136/">CVE-2016-6136 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6136">CVE-2016-6136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6198/">CVE-2016-6198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6198">CVE-2016-6198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6327/">CVE-2016-6327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6327">CVE-2016-6327 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6480">CVE-2016-6480 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822375" comment="kernel-3.10.0-514.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822376" comment="kernel-abi-whitelists-3.10.0-514.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822377" comment="kernel-debug-3.10.0-514.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822380" comment="kernel-doc-3.10.0-514.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822381" comment="kernel-headers-3.10.0-514.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822382" comment="kernel-tools-3.10.0-514.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822383" comment="kernel-tools-libs-3.10.0-514.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822385" comment="perf-3.10.0-514.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822386" comment="python-perf-3.10.0-514.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:351" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419/" source="CVE"/>
		<reference ref_id="CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420/" source="CVE"/>
		<reference ref_id="CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2575.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2575.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5419">CVE-2016-5419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5420">CVE-2016-5420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7141">CVE-2016-7141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822387" comment="curl-7.29.0-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822388" comment="libcurl-7.29.0-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822389" comment="libcurl-devel-7.29.0-35.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:352" version="1" class="patch">
	<metadata>
		<title>security update for libguestfs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8869" ref_url="https://www.suse.com/security/cve/CVE-2015-8869/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2576.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2576.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8869/">CVE-2015-8869 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8869">CVE-2015-8869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822390" comment="libguestfs-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822391" comment="libguestfs-bash-completion-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822392" comment="libguestfs-devel-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822393" comment="libguestfs-gfs2-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822394" comment="libguestfs-gobject-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822395" comment="libguestfs-gobject-devel-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822396" comment="libguestfs-gobject-doc-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822397" comment="libguestfs-inspect-icons-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822398" comment="libguestfs-java-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822399" comment="libguestfs-java-devel-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822400" comment="libguestfs-javadoc-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822401" comment="libguestfs-man-pages-ja-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822402" comment="libguestfs-man-pages-uk-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822403" comment="libguestfs-rescue-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822404" comment="libguestfs-rsync-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822405" comment="libguestfs-tools-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822406" comment="libguestfs-tools-c-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822407" comment="libguestfs-xfs-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822408" comment="lua-guestfs-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822409" comment="ocaml-libguestfs-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822410" comment="ocaml-libguestfs-devel-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822411" comment="perl-Sys-Guestfs-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822412" comment="python-libguestfs-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822413" comment="ruby-libguestfs-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822414" comment="virt-dib-1.32.7-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822415" comment="virt-v2v-1.32.7-3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:353" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5160" ref_url="https://www.suse.com/security/cve/CVE-2015-5160/" source="CVE"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="CVE-2016-5008" ref_url="https://www.suse.com/security/cve/CVE-2016-5008/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2577.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2577.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5160/">CVE-2015-5160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5160">CVE-2015-5160 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5313">CVE-2015-5313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5008/">CVE-2016-5008 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5008">CVE-2016-5008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822416" comment="libvirt-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822417" comment="libvirt-client-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822418" comment="libvirt-daemon-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822419" comment="libvirt-daemon-config-network-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822420" comment="libvirt-daemon-config-nwfilter-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822421" comment="libvirt-daemon-driver-interface-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822422" comment="libvirt-daemon-driver-lxc-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822423" comment="libvirt-daemon-driver-network-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822424" comment="libvirt-daemon-driver-nodedev-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822425" comment="libvirt-daemon-driver-nwfilter-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822426" comment="libvirt-daemon-driver-qemu-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822427" comment="libvirt-daemon-driver-secret-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822428" comment="libvirt-daemon-driver-storage-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822429" comment="libvirt-daemon-kvm-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822430" comment="libvirt-daemon-lxc-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822431" comment="libvirt-devel-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822432" comment="libvirt-docs-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822433" comment="libvirt-lock-sanlock-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822434" comment="libvirt-login-shell-2.0.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822435" comment="libvirt-nss-2.0.0-10.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:354" version="1" class="patch">
	<metadata>
		<title>security update for pacemaker (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-7797" ref_url="https://www.suse.com/security/cve/CVE-2016-7797/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2578.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2578.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7797/">CVE-2016-7797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7797">CVE-2016-7797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822436" comment="pacemaker-1.1.15-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822437" comment="pacemaker-cli-1.1.15-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822438" comment="pacemaker-cluster-libs-1.1.15-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822439" comment="pacemaker-cts-1.1.15-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822440" comment="pacemaker-doc-1.1.15-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822441" comment="pacemaker-libs-1.1.15-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822442" comment="pacemaker-libs-devel-1.1.15-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822443" comment="pacemaker-nagios-plugins-metadata-1.1.15-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822444" comment="pacemaker-remote-1.1.15-11.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:355" version="1" class="patch">
	<metadata>
		<title>security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8868" ref_url="https://www.suse.com/security/cve/CVE-2015-8868/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2580.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2580.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8868/">CVE-2015-8868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8868">CVE-2015-8868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822445" comment="poppler-0.26.5-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822446" comment="poppler-cpp-0.26.5-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822447" comment="poppler-cpp-devel-0.26.5-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822448" comment="poppler-demos-0.26.5-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822449" comment="poppler-devel-0.26.5-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822450" comment="poppler-glib-0.26.5-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822451" comment="poppler-glib-devel-0.26.5-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822452" comment="poppler-qt-0.26.5-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822453" comment="poppler-qt-devel-0.26.5-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822454" comment="poppler-utils-0.26.5-16.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:356" version="1" class="patch">
	<metadata>
		<title>security update for NetworkManager (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2581.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2581.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0764">CVE-2016-0764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822455" comment="NetworkManager-1.4.0-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822456" comment="NetworkManager-adsl-1.4.0-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822457" comment="NetworkManager-bluetooth-1.4.0-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822458" comment="NetworkManager-config-server-1.4.0-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822459" comment="NetworkManager-dispatcher-routing-rules-1.4.0-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822460" comment="NetworkManager-glib-1.4.0-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822461" comment="NetworkManager-glib-devel-1.4.0-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822462" comment="NetworkManager-libnm-1.4.0-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822463" comment="NetworkManager-libnm-devel-1.4.0-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822464" comment="NetworkManager-libreswan-1.2.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822465" comment="NetworkManager-libreswan-gnome-1.2.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822466" comment="NetworkManager-team-1.4.0-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822467" comment="NetworkManager-tui-1.4.0-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822468" comment="NetworkManager-wifi-1.4.0-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822469" comment="NetworkManager-wwan-1.4.0-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822470" comment="libnl3-3.2.28-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822471" comment="libnl3-cli-3.2.28-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822472" comment="libnl3-devel-3.2.28-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822473" comment="libnl3-doc-3.2.28-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822474" comment="libnm-gtk-1.4.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822475" comment="libnm-gtk-devel-1.4.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822476" comment="libnma-1.4.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822477" comment="libnma-devel-1.4.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822478" comment="network-manager-applet-1.4.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822479" comment="nm-connection-editor-1.4.0-2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:357" version="1" class="patch">
	<metadata>
		<title>security update for nettle (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803/" source="CVE"/>
		<reference ref_id="CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804/" source="CVE"/>
		<reference ref_id="CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805/" source="CVE"/>
		<reference ref_id="CVE-2016-6489" ref_url="https://www.suse.com/security/cve/CVE-2016-6489/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2582.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2582.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8803">CVE-2015-8803 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8804">CVE-2015-8804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8805">CVE-2015-8805 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6489/">CVE-2016-6489 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6489">CVE-2016-6489 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822480" comment="nettle-2.7.1-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822481" comment="nettle-devel-2.7.1-8.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:358" version="1" class="patch">
	<metadata>
		<title>security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5194" ref_url="https://www.suse.com/security/cve/CVE-2015-5194/" source="CVE"/>
		<reference ref_id="CVE-2015-5195" ref_url="https://www.suse.com/security/cve/CVE-2015-5195/" source="CVE"/>
		<reference ref_id="CVE-2015-5196" ref_url="https://www.suse.com/security/cve/CVE-2015-5196/" source="CVE"/>
		<reference ref_id="CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2583.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2583.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5194/">CVE-2015-5194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5194">CVE-2015-5194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5195/">CVE-2015-5195 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5195">CVE-2015-5195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5196/">CVE-2015-5196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5196">CVE-2015-5196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5219">CVE-2015-5219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7691">CVE-2015-7691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7692">CVE-2015-7692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7701">CVE-2015-7701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7702">CVE-2015-7702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7703">CVE-2015-7703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7852">CVE-2015-7852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7974">CVE-2015-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7977">CVE-2015-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7978">CVE-2015-7978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7979">CVE-2015-7979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8158">CVE-2015-8158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822482" comment="ntp-4.2.6p5-25.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822483" comment="ntp-doc-4.2.6p5-25.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822484" comment="ntp-perl-4.2.6p5-25.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822485" comment="ntpdate-4.2.6p5-25.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822486" comment="sntp-4.2.6p5-25.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:359" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2585.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2585.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3712">CVE-2016-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822487" comment="qemu-img-1.5.3-126.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822488" comment="qemu-kvm-1.5.3-126.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822489" comment="qemu-kvm-common-1.5.3-126.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822490" comment="qemu-kvm-tools-1.5.3-126.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:360" version="1" class="patch">
	<metadata>
		<title>security update for python (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2586.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2586.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822491" comment="python-2.7.5-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822492" comment="python-debug-2.7.5-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822493" comment="python-devel-2.7.5-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822494" comment="python-libs-2.7.5-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822495" comment="python-test-2.7.5-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822496" comment="python-tools-2.7.5-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822497" comment="tkinter-2.7.5-48.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:361" version="1" class="patch">
	<metadata>
		<title>security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2587.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2587.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4971">CVE-2016-4971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822498" comment="wget-1.14-13.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:362" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2588.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2588.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8325">CVE-2015-8325 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822499" comment="openssh-6.6.1p1-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822500" comment="openssh-askpass-6.6.1p1-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822501" comment="openssh-clients-6.6.1p1-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822502" comment="openssh-keycat-6.6.1p1-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822503" comment="openssh-ldap-6.6.1p1-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822504" comment="openssh-server-6.6.1p1-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822505" comment="openssh-server-sysvinit-6.6.1p1-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822506" comment="pam_ssh_agent_auth-0.9.3-9.31.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:363" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-4994" ref_url="https://www.suse.com/security/cve/CVE-2016-4994/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2589.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2589.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4994/">CVE-2016-4994 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4994">CVE-2016-4994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822507" comment="gimp-2.8.16-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822508" comment="gimp-devel-2.8.16-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822509" comment="gimp-devel-tools-2.8.16-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822510" comment="gimp-help-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822511" comment="gimp-help-ca-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822512" comment="gimp-help-da-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822513" comment="gimp-help-de-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822514" comment="gimp-help-el-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822515" comment="gimp-help-en_GB-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822516" comment="gimp-help-es-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822517" comment="gimp-help-fr-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822518" comment="gimp-help-it-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822519" comment="gimp-help-ja-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822520" comment="gimp-help-ko-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822521" comment="gimp-help-nl-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822522" comment="gimp-help-nn-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822523" comment="gimp-help-pt_BR-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822524" comment="gimp-help-ru-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822525" comment="gimp-help-sl-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822526" comment="gimp-help-sv-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822527" comment="gimp-help-zh_CN-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822528" comment="gimp-libs-2.8.16-3.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822507" comment="gimp-2.8.16-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822508" comment="gimp-devel-2.8.16-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822509" comment="gimp-devel-tools-2.8.16-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822510" comment="gimp-help-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822511" comment="gimp-help-ca-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822512" comment="gimp-help-da-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822513" comment="gimp-help-de-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822514" comment="gimp-help-el-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822515" comment="gimp-help-en_GB-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822516" comment="gimp-help-es-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822517" comment="gimp-help-fr-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822518" comment="gimp-help-it-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822519" comment="gimp-help-ja-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822520" comment="gimp-help-ko-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822521" comment="gimp-help-nl-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822522" comment="gimp-help-nn-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822523" comment="gimp-help-pt_BR-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822524" comment="gimp-help-ru-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822525" comment="gimp-help-sl-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822526" comment="gimp-help-sv-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822527" comment="gimp-help-zh_CN-2.8.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822528" comment="gimp-libs-2.8.16-3.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:364" version="1" class="patch">
	<metadata>
		<title>security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2590.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2590.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2774">CVE-2016-2774 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822529" comment="dhclient-4.2.5-47.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822530" comment="dhcp-4.2.5-47.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822531" comment="dhcp-common-4.2.5-47.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822532" comment="dhcp-devel-4.2.5-47.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822533" comment="dhcp-libs-4.2.5-47.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:365" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2591.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2591.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3119">CVE-2016-3119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3120">CVE-2016-3120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822534" comment="krb5-devel-1.14.1-26.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822535" comment="krb5-libs-1.14.1-26.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822536" comment="krb5-pkinit-1.14.1-26.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822537" comment="krb5-server-1.14.1-26.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822538" comment="krb5-server-ldap-1.14.1-26.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822539" comment="krb5-workstation-1.14.1-26.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822540" comment="libkadm5-1.14.1-26.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:366" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-7091" ref_url="https://www.suse.com/security/cve/CVE-2016-7091/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2593.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2593.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7091/">CVE-2016-7091 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7091">CVE-2016-7091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822541" comment="sudo-1.8.6p7-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822542" comment="sudo-devel-1.8.6p7-20.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:367" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-4992" ref_url="https://www.suse.com/security/cve/CVE-2016-4992/" source="CVE"/>
		<reference ref_id="CVE-2016-5405" ref_url="https://www.suse.com/security/cve/CVE-2016-5405/" source="CVE"/>
		<reference ref_id="CVE-2016-5416" ref_url="https://www.suse.com/security/cve/CVE-2016-5416/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2594.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2594.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4992/">CVE-2016-4992 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4992">CVE-2016-4992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5405/">CVE-2016-5405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5405">CVE-2016-5405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5416/">CVE-2016-5416 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5416">CVE-2016-5416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822543" comment="389-ds-base-1.3.5.10-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822544" comment="389-ds-base-devel-1.3.5.10-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822545" comment="389-ds-base-libs-1.3.5.10-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822546" comment="389-ds-base-snmp-1.3.5.10-11.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:368" version="1" class="patch">
	<metadata>
		<title>security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492/" source="CVE"/>
		<reference ref_id="CVE-2016-5612" ref_url="https://www.suse.com/security/cve/CVE-2016-5612/" source="CVE"/>
		<reference ref_id="CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624/" source="CVE"/>
		<reference ref_id="CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626/" source="CVE"/>
		<reference ref_id="CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="CVE-2016-6663" ref_url="https://www.suse.com/security/cve/CVE-2016-6663/" source="CVE"/>
		<reference ref_id="CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2595.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2595.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3492">CVE-2016-3492 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5612/">CVE-2016-5612 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5612">CVE-2016-5612 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5624">CVE-2016-5624 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5626">CVE-2016-5626 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5629">CVE-2016-5629 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6662">CVE-2016-6662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6663/">CVE-2016-6663 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6663">CVE-2016-6663 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8283">CVE-2016-8283 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822547" comment="mariadb-5.5.52-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822548" comment="mariadb-bench-5.5.52-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822549" comment="mariadb-devel-5.5.52-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822550" comment="mariadb-embedded-5.5.52-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822551" comment="mariadb-embedded-devel-5.5.52-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822552" comment="mariadb-libs-5.5.52-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822553" comment="mariadb-server-5.5.52-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822554" comment="mariadb-test-5.5.52-1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:369" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0720" ref_url="https://www.suse.com/security/cve/CVE-2016-0720/" source="CVE"/>
		<reference ref_id="CVE-2016-0721" ref_url="https://www.suse.com/security/cve/CVE-2016-0721/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2596.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2596.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0720/">CVE-2016-0720 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0720">CVE-2016-0720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0721/">CVE-2016-0721 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0721">CVE-2016-0721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822555" comment="pcs-0.9.152-10.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:370" version="1" class="patch">
	<metadata>
		<title>security update for firewalld (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5410" ref_url="https://www.suse.com/security/cve/CVE-2016-5410/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2597.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2597.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5410/">CVE-2016-5410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5410">CVE-2016-5410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822556" comment="firewall-applet-0.4.3.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822557" comment="firewall-config-0.4.3.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822558" comment="firewalld-0.4.3.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822559" comment="firewalld-filesystem-0.4.3.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822560" comment="python-firewall-0.4.3.2-8.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:371" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5399" ref_url="https://www.suse.com/security/cve/CVE-2016-5399/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2016-5767" ref_url="https://www.suse.com/security/cve/CVE-2016-5767/" source="CVE"/>
		<reference ref_id="CVE-2016-5768" ref_url="https://www.suse.com/security/cve/CVE-2016-5768/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2598.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2598.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5399/">CVE-2016-5399 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5399">CVE-2016-5399 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5766">CVE-2016-5766 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5767/">CVE-2016-5767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5767">CVE-2016-5767 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-5768/">CVE-2016-5768 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5768">CVE-2016-5768 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822561" comment="php-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822562" comment="php-bcmath-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822563" comment="php-cli-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822564" comment="php-common-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822565" comment="php-dba-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822566" comment="php-devel-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822567" comment="php-embedded-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822568" comment="php-enchant-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822569" comment="php-fpm-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822570" comment="php-gd-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822571" comment="php-intl-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822572" comment="php-ldap-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822573" comment="php-mbstring-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822574" comment="php-mysql-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822575" comment="php-mysqlnd-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822576" comment="php-odbc-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822577" comment="php-pdo-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822578" comment="php-pgsql-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822579" comment="php-process-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822580" comment="php-pspell-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822581" comment="php-recode-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822582" comment="php-snmp-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822583" comment="php-soap-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822584" comment="php-xml-5.4.16-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822585" comment="php-xmlrpc-5.4.16-42.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:372" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174/" source="CVE"/>
		<reference ref_id="CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345/" source="CVE"/>
		<reference ref_id="CVE-2015-5351" ref_url="https://www.suse.com/security/cve/CVE-2015-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706/" source="CVE"/>
		<reference ref_id="CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714/" source="CVE"/>
		<reference ref_id="CVE-2016-0763" ref_url="https://www.suse.com/security/cve/CVE-2016-0763/" source="CVE"/>
		<reference ref_id="CVE-2016-3092" ref_url="https://www.suse.com/security/cve/CVE-2016-3092/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2599.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2599.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5174">CVE-2015-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5345">CVE-2015-5345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5351/">CVE-2015-5351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5351">CVE-2015-5351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0706">CVE-2016-0706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0714">CVE-2016-0714 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0763/">CVE-2016-0763 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0763">CVE-2016-0763 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3092/">CVE-2016-3092 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3092">CVE-2016-3092 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822586" comment="tomcat-7.0.69-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822587" comment="tomcat-admin-webapps-7.0.69-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822588" comment="tomcat-docs-webapp-7.0.69-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822589" comment="tomcat-el-2.2-api-7.0.69-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822590" comment="tomcat-javadoc-7.0.69-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822591" comment="tomcat-jsp-2.2-api-7.0.69-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822592" comment="tomcat-jsvc-7.0.69-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822593" comment="tomcat-lib-7.0.69-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822594" comment="tomcat-servlet-3.0-api-7.0.69-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822595" comment="tomcat-webapps-7.0.69-10.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:373" version="1" class="patch">
	<metadata>
		<title>security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2569" ref_url="https://www.suse.com/security/cve/CVE-2016-2569/" source="CVE"/>
		<reference ref_id="CVE-2016-2570" ref_url="https://www.suse.com/security/cve/CVE-2016-2570/" source="CVE"/>
		<reference ref_id="CVE-2016-2571" ref_url="https://www.suse.com/security/cve/CVE-2016-2571/" source="CVE"/>
		<reference ref_id="CVE-2016-2572" ref_url="https://www.suse.com/security/cve/CVE-2016-2572/" source="CVE"/>
		<reference ref_id="CVE-2016-3948" ref_url="https://www.suse.com/security/cve/CVE-2016-3948/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2600.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2600.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2569/">CVE-2016-2569 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2569">CVE-2016-2569 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2570/">CVE-2016-2570 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2570">CVE-2016-2570 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2571/">CVE-2016-2571 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2571">CVE-2016-2571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2572/">CVE-2016-2572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2572">CVE-2016-2572 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3948/">CVE-2016-3948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3948">CVE-2016-3948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822596" comment="squid-3.5.20-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822597" comment="squid-migration-script-3.5.20-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822598" comment="squid-sysvinit-3.5.20-2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:374" version="1" class="patch">
	<metadata>
		<title>security update for fontconfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5384" ref_url="https://www.suse.com/security/cve/CVE-2016-5384/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2601.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2601.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5384/">CVE-2016-5384 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5384">CVE-2016-5384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822599" comment="fontconfig-2.10.95-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822600" comment="fontconfig-devel-2.10.95-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822601" comment="fontconfig-devel-doc-2.10.95-10.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:375" version="1" class="patch">
	<metadata>
		<title>security update for mod_nss (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-3099" ref_url="https://www.suse.com/security/cve/CVE-2016-3099/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2602.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2602.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3099/">CVE-2016-3099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3099">CVE-2016-3099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822602" comment="mod_nss-1.0.14-7.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:376" version="1" class="patch">
	<metadata>
		<title>security update for libreswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5361" ref_url="https://www.suse.com/security/cve/CVE-2016-5361/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2603.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2603.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5361/">CVE-2016-5361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5361">CVE-2016-5361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822603" comment="libreswan-3.15-8.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:377" version="1" class="patch">
	<metadata>
		<title>security update for resteasy-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-7050" ref_url="https://www.suse.com/security/cve/CVE-2016-7050/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2604.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2604.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7050/">CVE-2016-7050 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7050">CVE-2016-7050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822604" comment="resteasy-base-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822605" comment="resteasy-base-atom-provider-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822606" comment="resteasy-base-client-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822607" comment="resteasy-base-jackson-provider-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822608" comment="resteasy-base-javadoc-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822609" comment="resteasy-base-jaxb-provider-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822610" comment="resteasy-base-jaxrs-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822611" comment="resteasy-base-jaxrs-all-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822612" comment="resteasy-base-jaxrs-api-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822613" comment="resteasy-base-jettison-provider-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822614" comment="resteasy-base-providers-pom-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822615" comment="resteasy-base-resteasy-pom-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822616" comment="resteasy-base-tjws-3.0.6-4.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822604" comment="resteasy-base-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822605" comment="resteasy-base-atom-provider-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822606" comment="resteasy-base-client-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822607" comment="resteasy-base-jackson-provider-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822608" comment="resteasy-base-javadoc-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822609" comment="resteasy-base-jaxb-provider-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822610" comment="resteasy-base-jaxrs-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822611" comment="resteasy-base-jaxrs-all-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822612" comment="resteasy-base-jaxrs-api-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822613" comment="resteasy-base-jettison-provider-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822614" comment="resteasy-base-providers-pom-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822615" comment="resteasy-base-resteasy-pom-3.0.6-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822616" comment="resteasy-base-tjws-3.0.6-4.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:378" version="1" class="patch">
	<metadata>
		<title>security update for util-linux (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2605.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2605.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5011">CVE-2016-5011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822617" comment="libblkid-2.23.2-33.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822618" comment="libblkid-devel-2.23.2-33.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822619" comment="libmount-2.23.2-33.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822620" comment="libmount-devel-2.23.2-33.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822621" comment="libuuid-2.23.2-33.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822622" comment="libuuid-devel-2.23.2-33.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822623" comment="util-linux-2.23.2-33.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822624" comment="uuidd-2.23.2-33.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:379" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423/" source="CVE"/>
		<reference ref_id="CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2606.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2606.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5423">CVE-2016-5423 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5424">CVE-2016-5424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822625" comment="postgresql-9.2.18-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822626" comment="postgresql-contrib-9.2.18-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822627" comment="postgresql-devel-9.2.18-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822628" comment="postgresql-docs-9.2.18-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822629" comment="postgresql-libs-9.2.18-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822630" comment="postgresql-plperl-9.2.18-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822631" comment="postgresql-plpython-9.2.18-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822632" comment="postgresql-pltcl-9.2.18-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822633" comment="postgresql-server-9.2.18-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822634" comment="postgresql-test-9.2.18-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822635" comment="postgresql-upgrade-9.2.18-1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:380" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-7795" ref_url="https://www.suse.com/security/cve/CVE-2016-7795/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2610.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2610.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7795/">CVE-2016-7795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7795">CVE-2016-7795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822636" comment="libgudev1-219-30.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822637" comment="libgudev1-devel-219-30.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822638" comment="systemd-219-30.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822639" comment="systemd-devel-219-30.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822640" comment="systemd-journal-gateway-219-30.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822641" comment="systemd-libs-219-30.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822642" comment="systemd-networkd-219-30.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822643" comment="systemd-python-219-30.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822644" comment="systemd-resolved-219-30.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822645" comment="systemd-sysv-219-30.el7_3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:381" version="1" class="patch">
	<metadata>
		<title>security update for pacemaker (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-7035" ref_url="https://www.suse.com/security/cve/CVE-2016-7035/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2614.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2614.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7035/">CVE-2016-7035 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7035">CVE-2016-7035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822646" comment="pacemaker-1.1.15-11.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822647" comment="pacemaker-cli-1.1.15-11.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822648" comment="pacemaker-cluster-libs-1.1.15-11.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822649" comment="pacemaker-cts-1.1.15-11.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822650" comment="pacemaker-doc-1.1.15-11.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822651" comment="pacemaker-libs-1.1.15-11.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822652" comment="pacemaker-libs-devel-1.1.15-11.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822653" comment="pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822654" comment="pacemaker-remote-1.1.15-11.el7_3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:382" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2615.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2615.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8864">CVE-2016-8864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822655" comment="bind-9.9.4-38.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822656" comment="bind-chroot-9.9.4-38.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822657" comment="bind-devel-9.9.4-38.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822658" comment="bind-libs-9.9.4-38.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822659" comment="bind-libs-lite-9.9.4-38.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822660" comment="bind-license-9.9.4-38.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822661" comment="bind-lite-devel-9.9.4-38.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822662" comment="bind-pkcs11-9.9.4-38.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822663" comment="bind-pkcs11-devel-9.9.4-38.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822664" comment="bind-pkcs11-libs-9.9.4-38.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822665" comment="bind-pkcs11-utils-9.9.4-38.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822666" comment="bind-sdb-9.9.4-38.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822667" comment="bind-sdb-chroot-9.9.4-38.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822668" comment="bind-utils-9.9.4-38.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:383" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2658.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2658.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5582">CVE-2016-5582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822669" comment="java-1.7.0-openjdk-1.7.0.121-2.6.8.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822670" comment="java-1.7.0-openjdk-accessibility-1.7.0.121-2.6.8.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822671" comment="java-1.7.0-openjdk-demo-1.7.0.121-2.6.8.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822672" comment="java-1.7.0-openjdk-devel-1.7.0.121-2.6.8.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822673" comment="java-1.7.0-openjdk-headless-1.7.0.121-2.6.8.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822674" comment="java-1.7.0-openjdk-javadoc-1.7.0.121-2.6.8.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822675" comment="java-1.7.0-openjdk-src-1.7.0.121-2.6.8.0.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:384" version="1" class="patch">
	<metadata>
		<title>security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2674.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2674.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6313">CVE-2016-6313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822676" comment="libgcrypt-1.5.3-13.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822677" comment="libgcrypt-devel-1.5.3-13.el7_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:385" version="1" class="patch">
	<metadata>
		<title>security update for policycoreutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2702.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2702.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7545">CVE-2016-7545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822678" comment="policycoreutils-2.5-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822679" comment="policycoreutils-devel-2.5-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822680" comment="policycoreutils-gui-2.5-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822681" comment="policycoreutils-newrole-2.5-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822682" comment="policycoreutils-python-2.5-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822683" comment="policycoreutils-restorecond-2.5-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822684" comment="policycoreutils-sandbox-2.5-9.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:386" version="1" class="patch">
	<metadata>
		<title>security update for nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285/" source="CVE"/>
		<reference ref_id="CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2779.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2779.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5285">CVE-2016-5285 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8635">CVE-2016-8635 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822685" comment="nss-3.21.3-2.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822686" comment="nss-devel-3.21.3-2.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822687" comment="nss-pkcs11-devel-3.21.3-2.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822688" comment="nss-sysinit-3.21.3-2.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822689" comment="nss-tools-3.21.3-2.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822690" comment="nss-util-3.21.3-1.1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822691" comment="nss-util-devel-3.21.3-1.1.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:387" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2780.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2780.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5290">CVE-2016-5290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5291">CVE-2016-5291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5296">CVE-2016-5296 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5297">CVE-2016-5297 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9064">CVE-2016-9064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9066">CVE-2016-9066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822692" comment="firefox-45.5.0-1.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:388" version="1" class="patch">
	<metadata>
		<title>security update for ipsilon (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-8638" ref_url="https://www.suse.com/security/cve/CVE-2016-8638/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2809.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2809.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8638/">CVE-2016-8638 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8638">CVE-2016-8638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822693" comment="ipsilon-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822694" comment="ipsilon-authform-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822695" comment="ipsilon-authgssapi-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822696" comment="ipsilon-authldap-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822697" comment="ipsilon-base-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822698" comment="ipsilon-client-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822699" comment="ipsilon-filesystem-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822700" comment="ipsilon-infosssd-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822701" comment="ipsilon-persona-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822702" comment="ipsilon-saml2-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822703" comment="ipsilon-saml2-base-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822704" comment="ipsilon-tools-ipa-1.0.0-13.el7_3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822693" comment="ipsilon-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822694" comment="ipsilon-authform-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822695" comment="ipsilon-authgssapi-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822696" comment="ipsilon-authldap-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822697" comment="ipsilon-base-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822698" comment="ipsilon-client-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822699" comment="ipsilon-filesystem-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822700" comment="ipsilon-infosssd-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822701" comment="ipsilon-persona-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822702" comment="ipsilon-saml2-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822703" comment="ipsilon-saml2-base-1.0.0-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822704" comment="ipsilon-tools-ipa-1.0.0-13.el7_3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:389" version="1" class="patch">
	<metadata>
		<title>security update for memcached (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-8704" ref_url="https://www.suse.com/security/cve/CVE-2016-8704/" source="CVE"/>
		<reference ref_id="CVE-2016-8705" ref_url="https://www.suse.com/security/cve/CVE-2016-8705/" source="CVE"/>
		<reference ref_id="CVE-2016-8706" ref_url="https://www.suse.com/security/cve/CVE-2016-8706/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2819.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2819.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8704/">CVE-2016-8704 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8704">CVE-2016-8704 at NVD</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8705/">CVE-2016-8705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8705">CVE-2016-8705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8706/">CVE-2016-8706 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8706">CVE-2016-8706 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822705" comment="memcached-1.4.15-10.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822706" comment="memcached-devel-1.4.15-10.el7_3.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822705" comment="memcached-1.4.15-10.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822706" comment="memcached-devel-1.4.15-10.el7_3.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:390" version="1" class="patch">
	<metadata>
		<title>security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2824.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2824.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822707" comment="expat-2.1.0-10.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822708" comment="expat-devel-2.1.0-10.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822709" comment="expat-static-2.1.0-10.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:391" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2825.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2825.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5290">CVE-2016-5290 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822710" comment="thunderbird-45.5.0-1.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:392" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2843.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2843.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9079">CVE-2016-9079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822711" comment="firefox-45.5.1-1.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:393" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2850.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2850.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9079">CVE-2016-9079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822712" comment="thunderbird-45.5.1-1.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:394" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2872.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2872.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7032">CVE-2016-7032 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7076">CVE-2016-7076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822713" comment="sudo-1.8.6p7-21.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822714" comment="sudo-devel-1.8.6p7-21.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:395" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2946.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2946.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9893">CVE-2016-9893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9895">CVE-2016-9895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9897">CVE-2016-9897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9898">CVE-2016-9898 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9899">CVE-2016-9899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9900">CVE-2016-9900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9901">CVE-2016-9901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9902">CVE-2016-9902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9904">CVE-2016-9904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9905">CVE-2016-9905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822715" comment="firefox-45.6.0-1.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:396" version="1" class="patch">
	<metadata>
		<title>security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2972.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2972.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1248">CVE-2016-1248 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822716" comment="vim-X11-7.4.160-1.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822717" comment="vim-common-7.4.160-1.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822718" comment="vim-enhanced-7.4.160-1.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822719" comment="vim-filesystem-7.4.160-1.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822720" comment="vim-minimal-7.4.160-1.el7_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:397" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2016:2973.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2016:2973.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9893">CVE-2016-9893 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9895">CVE-2016-9895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9899">CVE-2016-9899 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9900">CVE-2016-9900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9901">CVE-2016-9901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9902">CVE-2016-9902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9905">CVE-2016-9905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822721" comment="thunderbird-45.6.0-1.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:398" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-7030" ref_url="https://www.suse.com/security/cve/CVE-2016-7030/" source="CVE"/>
		<reference ref_id="CVE-2016-9575" ref_url="https://www.suse.com/security/cve/CVE-2016-9575/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0001.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0001.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7030/">CVE-2016-7030 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7030">CVE-2016-7030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9575/">CVE-2016-9575 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9575">CVE-2016-9575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822722" comment="ipa-admintools-4.4.0-14.el7_3.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822723" comment="ipa-client-4.4.0-14.el7_3.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822724" comment="ipa-client-common-4.4.0-14.el7_3.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822725" comment="ipa-common-4.4.0-14.el7_3.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822726" comment="ipa-python-compat-4.4.0-14.el7_3.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822727" comment="ipa-server-4.4.0-14.el7_3.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822728" comment="ipa-server-common-4.4.0-14.el7_3.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822729" comment="ipa-server-dns-4.4.0-14.el7_3.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822730" comment="ipa-server-trust-ad-4.4.0-14.el7_3.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822731" comment="python2-ipaclient-4.4.0-14.el7_3.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822732" comment="python2-ipalib-4.4.0-14.el7_3.1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822733" comment="python2-ipaserver-4.4.0-14.el7_3.1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:399" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7978" ref_url="https://www.suse.com/security/cve/CVE-2016-7978/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0013.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0013.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-5653">CVE-2013-5653 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7977">CVE-2016-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7978/">CVE-2016-7978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7978">CVE-2016-7978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7979">CVE-2016-7979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8602">CVE-2016-8602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822734" comment="ghostscript-9.07-20.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822735" comment="ghostscript-cups-9.07-20.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822736" comment="ghostscript-devel-9.07-20.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822737" comment="ghostscript-doc-9.07-20.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822738" comment="ghostscript-gtk-9.07-20.el7_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:400" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer-plugins-bad-free (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445/" source="CVE"/>
		<reference ref_id="CVE-2016-9447" ref_url="https://www.suse.com/security/cve/CVE-2016-9447/" source="CVE"/>
		<reference ref_id="CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0018.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0018.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9445">CVE-2016-9445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9447/">CVE-2016-9447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9447">CVE-2016-9447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9809">CVE-2016-9809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822739" comment="gstreamer-plugins-bad-free-0.10.23-22.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822740" comment="gstreamer-plugins-bad-free-devel-0.10.23-22.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822741" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-22.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:401" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer-plugins-good (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0019.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0019.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9634">CVE-2016-9634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9635">CVE-2016-9635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9636">CVE-2016-9636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9807">CVE-2016-9807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9808">CVE-2016-9808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822742" comment="gstreamer-plugins-good-0.10.31-12.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822743" comment="gstreamer-plugins-good-devel-docs-0.10.31-12.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:402" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-good (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634/" source="CVE"/>
		<reference ref_id="CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635/" source="CVE"/>
		<reference ref_id="CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636/" source="CVE"/>
		<reference ref_id="CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807/" source="CVE"/>
		<reference ref_id="CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0020.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0020.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9634">CVE-2016-9634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9635">CVE-2016-9635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9636">CVE-2016-9636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9807">CVE-2016-9807 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9808">CVE-2016-9808 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822744" comment="gstreamer1-plugins-good-1.4.5-3.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:403" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-bad-free (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445/" source="CVE"/>
		<reference ref_id="CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809/" source="CVE"/>
		<reference ref_id="CVE-2016-9812" ref_url="https://www.suse.com/security/cve/CVE-2016-9812/" source="CVE"/>
		<reference ref_id="CVE-2016-9813" ref_url="https://www.suse.com/security/cve/CVE-2016-9813/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0021.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0021.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9445">CVE-2016-9445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9809">CVE-2016-9809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9812/">CVE-2016-9812 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9812">CVE-2016-9812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9813/">CVE-2016-9813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9813">CVE-2016-9813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822745" comment="gstreamer1-plugins-bad-free-1.4.5-6.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822746" comment="gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:404" version="1" class="patch">
	<metadata>
		<title>security update for java-1.6.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0061.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0061.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5542">CVE-2016-5542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5554">CVE-2016-5554 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5573">CVE-2016-5573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5582">CVE-2016-5582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5597">CVE-2016-5597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822747" comment="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822748" comment="java-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822749" comment="java-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822750" comment="java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822751" comment="java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el7_3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822747" comment="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822748" comment="java-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822749" comment="java-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822750" comment="java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822751" comment="java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el7_3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:405" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0062.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0062.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9131">CVE-2016-9131 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9147">CVE-2016-9147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9444">CVE-2016-9444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822752" comment="bind-9.9.4-38.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822753" comment="bind-chroot-9.9.4-38.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822754" comment="bind-devel-9.9.4-38.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822755" comment="bind-libs-9.9.4-38.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822756" comment="bind-libs-lite-9.9.4-38.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822757" comment="bind-license-9.9.4-38.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822758" comment="bind-lite-devel-9.9.4-38.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822759" comment="bind-pkcs11-9.9.4-38.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822760" comment="bind-pkcs11-devel-9.9.4-38.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822761" comment="bind-pkcs11-libs-9.9.4-38.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822762" comment="bind-pkcs11-utils-9.9.4-38.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822763" comment="bind-sdb-9.9.4-38.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822764" comment="bind-sdb-chroot-9.9.4-38.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822765" comment="bind-utils-9.9.4-38.el7_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:406" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2857" ref_url="https://www.suse.com/security/cve/CVE-2016-2857/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0083.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0083.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2857/">CVE-2016-2857 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2857">CVE-2016-2857 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822766" comment="qemu-img-1.5.3-126.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822767" comment="qemu-kvm-1.5.3-126.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822768" comment="qemu-kvm-common-1.5.3-126.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822769" comment="qemu-kvm-tools-1.5.3-126.el7_3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:407" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828/" source="CVE"/>
		<reference ref_id="CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117/" source="CVE"/>
		<reference ref_id="CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0086.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0086.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6828">CVE-2016-6828 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7117">CVE-2016-7117 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9555">CVE-2016-9555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822770" comment="kernel-3.10.0-514.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822771" comment="kernel-abi-whitelists-3.10.0-514.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822772" comment="kernel-debug-3.10.0-514.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822775" comment="kernel-doc-3.10.0-514.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822776" comment="kernel-headers-3.10.0-514.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822777" comment="kernel-tools-3.10.0-514.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822778" comment="kernel-tools-libs-3.10.0-514.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822780" comment="perf-3.10.0-514.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822781" comment="python-perf-3.10.0-514.6.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:408" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0180.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0180.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5546">CVE-2016-5546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5547">CVE-2016-5547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5548">CVE-2016-5548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5552">CVE-2016-5552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3231">CVE-2017-3231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3241">CVE-2017-3241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3252">CVE-2017-3252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3253">CVE-2017-3253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3261">CVE-2017-3261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3272">CVE-2017-3272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3289">CVE-2017-3289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822782" comment="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822783" comment="java-1.8.0-openjdk-accessibility-1.8.0.121-0.b13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822784" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822785" comment="java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822786" comment="java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822787" comment="java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822788" comment="java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822789" comment="java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822790" comment="java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822791" comment="java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822792" comment="java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822793" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822794" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.121-0.b13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822795" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.121-0.b13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822796" comment="java-1.8.0-openjdk-src-1.8.0.121-0.b13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822797" comment="java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:409" version="1" class="patch">
	<metadata>
		<title>security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-10002" ref_url="https://www.suse.com/security/cve/CVE-2016-10002/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0182.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0182.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10002/">CVE-2016-10002 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10002">CVE-2016-10002 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822798" comment="squid-3.5.20-2.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822799" comment="squid-migration-script-3.5.20-2.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822800" comment="squid-sysvinit-3.5.20-2.el7_3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:410" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0190.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0190.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5373">CVE-2017-5373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5375">CVE-2017-5375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5376">CVE-2017-5376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5378">CVE-2017-5378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5380">CVE-2017-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5383">CVE-2017-5383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5386">CVE-2017-5386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5390">CVE-2017-5390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5396">CVE-2017-5396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822801" comment="firefox-45.7.0-1.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:411" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8870" ref_url="https://www.suse.com/security/cve/CVE-2015-8870/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-9533" ref_url="https://www.suse.com/security/cve/CVE-2016-9533/" source="CVE"/>
		<reference ref_id="CVE-2016-9534" ref_url="https://www.suse.com/security/cve/CVE-2016-9534/" source="CVE"/>
		<reference ref_id="CVE-2016-9535" ref_url="https://www.suse.com/security/cve/CVE-2016-9535/" source="CVE"/>
		<reference ref_id="CVE-2016-9536" ref_url="https://www.suse.com/security/cve/CVE-2016-9536/" source="CVE"/>
		<reference ref_id="CVE-2016-9537" ref_url="https://www.suse.com/security/cve/CVE-2016-9537/" source="CVE"/>
		<reference ref_id="CVE-2016-9540" ref_url="https://www.suse.com/security/cve/CVE-2016-9540/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0225.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0225.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8870/">CVE-2015-8870 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8870">CVE-2015-8870 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5652">CVE-2016-5652 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9533/">CVE-2016-9533 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9533">CVE-2016-9533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9534/">CVE-2016-9534 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9534">CVE-2016-9534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9535/">CVE-2016-9535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9535">CVE-2016-9535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9536/">CVE-2016-9536 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9536">CVE-2016-9536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9537/">CVE-2016-9537 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9537">CVE-2016-9537 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9540/">CVE-2016-9540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9540">CVE-2016-9540 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822802" comment="libtiff-4.0.3-27.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822803" comment="libtiff-devel-4.0.3-27.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822804" comment="libtiff-static-4.0.3-27.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822805" comment="libtiff-tools-4.0.3-27.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:412" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0238.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0238.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5373">CVE-2017-5373 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5375">CVE-2017-5375 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5376">CVE-2017-5376 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5378">CVE-2017-5378 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5380">CVE-2017-5380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5383">CVE-2017-5383 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5390">CVE-2017-5390 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5396">CVE-2017-5396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822806" comment="thunderbird-45.7.0-1.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:413" version="1" class="patch">
	<metadata>
		<title>security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0252.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0252.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7426">CVE-2016-7426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7429">CVE-2016-7429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7433">CVE-2016-7433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9310">CVE-2016-9310 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9311">CVE-2016-9311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822807" comment="ntp-4.2.6p5-25.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822808" comment="ntp-doc-4.2.6p5-25.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822809" comment="ntp-perl-4.2.6p5-25.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822810" comment="ntpdate-4.2.6p5-25.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822811" comment="sntp-4.2.6p5-25.el7_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:414" version="1" class="patch">
	<metadata>
		<title>security update for spice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577/" source="CVE"/>
		<reference ref_id="CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0254.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0254.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9577">CVE-2016-9577 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9578">CVE-2016-9578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822812" comment="spice-server-0.12.4-20.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822813" comment="spice-server-devel-0.12.4-20.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:415" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0269.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0269.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5546">CVE-2016-5546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5547">CVE-2016-5547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5548">CVE-2016-5548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5552">CVE-2016-5552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3231">CVE-2017-3231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3241">CVE-2017-3241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3252">CVE-2017-3252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3253">CVE-2017-3253 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3261">CVE-2017-3261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3272">CVE-2017-3272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3289">CVE-2017-3289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822814" comment="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822815" comment="java-1.7.0-openjdk-accessibility-1.7.0.131-2.6.9.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822816" comment="java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822817" comment="java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822818" comment="java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822819" comment="java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822820" comment="java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:416" version="1" class="patch">
	<metadata>
		<title>security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0276.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0276.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3135">CVE-2017-3135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822821" comment="bind-9.9.4-38.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822822" comment="bind-chroot-9.9.4-38.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822823" comment="bind-devel-9.9.4-38.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822824" comment="bind-libs-9.9.4-38.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822825" comment="bind-libs-lite-9.9.4-38.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822826" comment="bind-license-9.9.4-38.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822827" comment="bind-lite-devel-9.9.4-38.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822828" comment="bind-pkcs11-9.9.4-38.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822829" comment="bind-pkcs11-devel-9.9.4-38.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822830" comment="bind-pkcs11-libs-9.9.4-38.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822831" comment="bind-pkcs11-utils-9.9.4-38.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822832" comment="bind-sdb-9.9.4-38.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822833" comment="bind-sdb-chroot-9.9.4-38.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822834" comment="bind-utils-9.9.4-38.el7_3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:417" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0286.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0286.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3731">CVE-2017-3731 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822835" comment="openssl-1.0.1e-60.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822836" comment="openssl-devel-1.0.1e-60.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822837" comment="openssl-libs-1.0.1e-60.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822838" comment="openssl-perl-1.0.1e-60.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822839" comment="openssl-static-1.0.1e-60.el7_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:418" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0294.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0294.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6074">CVE-2017-6074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822840" comment="kernel-3.10.0-514.6.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822841" comment="kernel-abi-whitelists-3.10.0-514.6.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822842" comment="kernel-debug-3.10.0-514.6.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822845" comment="kernel-doc-3.10.0-514.6.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822846" comment="kernel-headers-3.10.0-514.6.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822847" comment="kernel-tools-3.10.0-514.6.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822848" comment="kernel-tools-libs-3.10.0-514.6.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822850" comment="perf-3.10.0-514.6.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822851" comment="python-perf-3.10.0-514.6.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:419" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-8630" ref_url="https://www.suse.com/security/cve/CVE-2016-8630/" source="CVE"/>
		<reference ref_id="CVE-2016-8655" ref_url="https://www.suse.com/security/cve/CVE-2016-8655/" source="CVE"/>
		<reference ref_id="CVE-2016-9083" ref_url="https://www.suse.com/security/cve/CVE-2016-9083/" source="CVE"/>
		<reference ref_id="CVE-2016-9084" ref_url="https://www.suse.com/security/cve/CVE-2016-9084/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0386.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0386.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8630/">CVE-2016-8630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8630">CVE-2016-8630 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8655/">CVE-2016-8655 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8655">CVE-2016-8655 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9083/">CVE-2016-9083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9083">CVE-2016-9083 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9084/">CVE-2016-9084 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9084">CVE-2016-9084 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822852" comment="kernel-3.10.0-514.10.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822853" comment="kernel-abi-whitelists-3.10.0-514.10.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822854" comment="kernel-debug-3.10.0-514.10.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822857" comment="kernel-doc-3.10.0-514.10.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822858" comment="kernel-headers-3.10.0-514.10.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822859" comment="kernel-tools-3.10.0-514.10.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822860" comment="kernel-tools-libs-3.10.0-514.10.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822862" comment="perf-3.10.0-514.10.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822863" comment="python-perf-3.10.0-514.10.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:420" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-2590" ref_url="https://www.suse.com/security/cve/CVE-2017-2590/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0388.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0388.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2590/">CVE-2017-2590 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2590">CVE-2017-2590 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822864" comment="ipa-admintools-4.4.0-14.el7_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822865" comment="ipa-client-4.4.0-14.el7_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822866" comment="ipa-client-common-4.4.0-14.el7_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822867" comment="ipa-common-4.4.0-14.el7_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822868" comment="ipa-python-compat-4.4.0-14.el7_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822869" comment="ipa-server-4.4.0-14.el7_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822870" comment="ipa-server-common-4.4.0-14.el7_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822871" comment="ipa-server-dns-4.4.0-14.el7_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822872" comment="ipa-server-trust-ad-4.4.0-14.el7_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822873" comment="python2-ipaclient-4.4.0-14.el7_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822874" comment="python2-ipalib-4.4.0-14.el7_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822875" comment="python2-ipaserver-4.4.0-14.el7_3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:421" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0396.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0396.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822876" comment="qemu-img-1.5.3-126.el7_3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822877" comment="qemu-kvm-1.5.3-126.el7_3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822878" comment="qemu-kvm-common-1.5.3-126.el7_3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822879" comment="qemu-kvm-tools-1.5.3-126.el7_3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:422" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0461.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0461.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5398">CVE-2017-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5400">CVE-2017-5400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5401">CVE-2017-5401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5402">CVE-2017-5402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5404">CVE-2017-5404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5405">CVE-2017-5405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5407">CVE-2017-5407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5408">CVE-2017-5408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5410">CVE-2017-5410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822880" comment="firefox-52.0-4.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:423" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0498.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0498.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5398">CVE-2017-5398 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5400">CVE-2017-5400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5401">CVE-2017-5401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5402">CVE-2017-5402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5404">CVE-2017-5404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5405">CVE-2017-5405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5407">CVE-2017-5407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5408">CVE-2017-5408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5410">CVE-2017-5410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822881" comment="thunderbird-45.8.0-1.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:424" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5428" ref_url="https://www.suse.com/security/cve/CVE-2017-5428/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0558.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0558.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5428/">CVE-2017-5428 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5428">CVE-2017-5428 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822882" comment="firefox-52.0-5.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:425" version="1" class="patch">
	<metadata>
		<title>security update for icoutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-5208" ref_url="https://www.suse.com/security/cve/CVE-2017-5208/" source="CVE"/>
		<reference ref_id="CVE-2017-5332" ref_url="https://www.suse.com/security/cve/CVE-2017-5332/" source="CVE"/>
		<reference ref_id="CVE-2017-5333" ref_url="https://www.suse.com/security/cve/CVE-2017-5333/" source="CVE"/>
		<reference ref_id="CVE-2017-6009" ref_url="https://www.suse.com/security/cve/CVE-2017-6009/" source="CVE"/>
		<reference ref_id="CVE-2017-6010" ref_url="https://www.suse.com/security/cve/CVE-2017-6010/" source="CVE"/>
		<reference ref_id="CVE-2017-6011" ref_url="https://www.suse.com/security/cve/CVE-2017-6011/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0837.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0837.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5208/">CVE-2017-5208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5208">CVE-2017-5208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5332/">CVE-2017-5332 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5332">CVE-2017-5332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5333/">CVE-2017-5333 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5333">CVE-2017-5333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6009/">CVE-2017-6009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6009">CVE-2017-6009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6010/">CVE-2017-6010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6010">CVE-2017-6010 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6011/">CVE-2017-6011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6011">CVE-2017-6011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822883" comment="icoutils-0.31.3-1.el7_3 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822883" comment="icoutils-0.31.3-1.el7_3 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:426" version="1" class="patch">
	<metadata>
		<title>security update for openjpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5139" ref_url="https://www.suse.com/security/cve/CVE-2016-5139/" source="CVE"/>
		<reference ref_id="CVE-2016-5158" ref_url="https://www.suse.com/security/cve/CVE-2016-5158/" source="CVE"/>
		<reference ref_id="CVE-2016-5159" ref_url="https://www.suse.com/security/cve/CVE-2016-5159/" source="CVE"/>
		<reference ref_id="CVE-2016-7163" ref_url="https://www.suse.com/security/cve/CVE-2016-7163/" source="CVE"/>
		<reference ref_id="CVE-2016-9573" ref_url="https://www.suse.com/security/cve/CVE-2016-9573/" source="CVE"/>
		<reference ref_id="CVE-2016-9675" ref_url="https://www.suse.com/security/cve/CVE-2016-9675/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0838.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0838.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5139/">CVE-2016-5139 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5139">CVE-2016-5139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5158/">CVE-2016-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5158">CVE-2016-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5159/">CVE-2016-5159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5159">CVE-2016-5159 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7163/">CVE-2016-7163 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7163">CVE-2016-7163 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9573/">CVE-2016-9573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9573">CVE-2016-9573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9675/">CVE-2016-9675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9675">CVE-2016-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822884" comment="openjpeg-1.5.1-16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822885" comment="openjpeg-devel-1.5.1-16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822886" comment="openjpeg-libs-1.5.1-16.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:427" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0736" ref_url="https://www.suse.com/security/cve/CVE-2016-0736/" source="CVE"/>
		<reference ref_id="CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0906.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0906.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0736/">CVE-2016-0736 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0736">CVE-2016-0736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2161">CVE-2016-2161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8743">CVE-2016-8743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822887" comment="httpd-2.4.6-45.el7_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822888" comment="httpd-devel-2.4.6-45.el7_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822889" comment="httpd-manual-2.4.6-45.el7_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822890" comment="httpd-tools-2.4.6-45.el7_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822891" comment="mod_ldap-2.4.6-45.el7_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822892" comment="mod_proxy_html-2.4.6-45.el7_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822893" comment="mod_session-2.4.6-45.el7_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822894" comment="mod_ssl-2.4.6-45.el7_3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:428" version="1" class="patch">
	<metadata>
		<title>security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0907.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0907.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2616">CVE-2017-2616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822895" comment="libblkid-2.23.2-33.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822896" comment="libblkid-devel-2.23.2-33.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822897" comment="libmount-2.23.2-33.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822898" comment="libmount-devel-2.23.2-33.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822899" comment="libuuid-2.23.2-33.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822900" comment="libuuid-devel-2.23.2-33.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822901" comment="util-linux-2.23.2-33.el7_3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822902" comment="uuidd-2.23.2-33.el7_3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:429" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-2668" ref_url="https://www.suse.com/security/cve/CVE-2017-2668/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0920.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0920.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2668/">CVE-2017-2668 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2668">CVE-2017-2668 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822903" comment="389-ds-base-1.3.5.10-20.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822904" comment="389-ds-base-devel-1.3.5.10-20.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822905" comment="389-ds-base-libs-1.3.5.10-20.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822906" comment="389-ds-base-snmp-1.3.5.10-20.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:430" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-8650" ref_url="https://www.suse.com/security/cve/CVE-2016-8650/" source="CVE"/>
		<reference ref_id="CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793/" source="CVE"/>
		<reference ref_id="CVE-2017-2618" ref_url="https://www.suse.com/security/cve/CVE-2017-2618/" source="CVE"/>
		<reference ref_id="CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0933.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0933.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8650/">CVE-2016-8650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8650">CVE-2016-8650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9793">CVE-2016-9793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2618/">CVE-2017-2618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2618">CVE-2017-2618 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2636">CVE-2017-2636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822907" comment="kernel-3.10.0-514.16.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822908" comment="kernel-abi-whitelists-3.10.0-514.16.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822909" comment="kernel-debug-3.10.0-514.16.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822912" comment="kernel-doc-3.10.0-514.16.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822913" comment="kernel-headers-3.10.0-514.16.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822914" comment="kernel-tools-3.10.0-514.16.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822915" comment="kernel-tools-libs-3.10.0-514.16.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822917" comment="perf-3.10.0-514.16.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822918" comment="python-perf-3.10.0-514.16.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:431" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-6816" ref_url="https://www.suse.com/security/cve/CVE-2016-6816/" source="CVE"/>
		<reference ref_id="CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0935.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0935.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6816/">CVE-2016-6816 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6816">CVE-2016-6816 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8745">CVE-2016-8745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822919" comment="tomcat-7.0.69-11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822920" comment="tomcat-admin-webapps-7.0.69-11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822921" comment="tomcat-docs-webapp-7.0.69-11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822922" comment="tomcat-el-2.2-api-7.0.69-11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822923" comment="tomcat-javadoc-7.0.69-11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822924" comment="tomcat-jsp-2.2-api-7.0.69-11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822925" comment="tomcat-jsvc-7.0.69-11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822926" comment="tomcat-lib-7.0.69-11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822927" comment="tomcat-servlet-3.0-api-7.0.69-11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822928" comment="tomcat-webapps-7.0.69-11.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:432" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:0987.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:0987.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9603">CVE-2016-9603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822929" comment="qemu-img-1.5.3-126.el7_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822930" comment="qemu-kvm-1.5.3-126.el7_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822931" comment="qemu-kvm-common-1.5.3-126.el7_3.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822932" comment="qemu-kvm-tools-1.5.3-126.el7_3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:433" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1095.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1095.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3136">CVE-2017-3136 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3137">CVE-2017-3137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822933" comment="bind-9.9.4-38.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822934" comment="bind-chroot-9.9.4-38.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822935" comment="bind-devel-9.9.4-38.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822936" comment="bind-libs-9.9.4-38.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822937" comment="bind-libs-lite-9.9.4-38.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822938" comment="bind-license-9.9.4-38.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822939" comment="bind-lite-devel-9.9.4-38.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822940" comment="bind-pkcs11-9.9.4-38.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822941" comment="bind-pkcs11-devel-9.9.4-38.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822942" comment="bind-pkcs11-libs-9.9.4-38.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822943" comment="bind-pkcs11-utils-9.9.4-38.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822944" comment="bind-sdb-9.9.4-38.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822945" comment="bind-sdb-chroot-9.9.4-38.el7_3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822946" comment="bind-utils-9.9.4-38.el7_3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:434" version="1" class="patch">
	<metadata>
		<title>security update for nss (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1100.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1100.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5461">CVE-2017-5461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822947" comment="nss-3.28.4-1.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822948" comment="nss-devel-3.28.4-1.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822949" comment="nss-pkcs11-devel-3.28.4-1.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822950" comment="nss-sysinit-3.28.4-1.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822951" comment="nss-tools-3.28.4-1.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822952" comment="nss-util-3.28.4-1.0.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822953" comment="nss-util-devel-3.28.4-1.0.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:435" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1106.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1106.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5429">CVE-2017-5429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5430">CVE-2017-5430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5432">CVE-2017-5432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5433">CVE-2017-5433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5434">CVE-2017-5434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5435">CVE-2017-5435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5437">CVE-2017-5437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5438">CVE-2017-5438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5439">CVE-2017-5439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5440">CVE-2017-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5441">CVE-2017-5441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5442">CVE-2017-5442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5443">CVE-2017-5443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5444">CVE-2017-5444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5445">CVE-2017-5445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5446">CVE-2017-5446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5447">CVE-2017-5447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5448">CVE-2017-5448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5449">CVE-2017-5449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5451">CVE-2017-5451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5454">CVE-2017-5454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5455">CVE-2017-5455 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5456">CVE-2017-5456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5459">CVE-2017-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5460">CVE-2017-5460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5464">CVE-2017-5464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5465">CVE-2017-5465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5466">CVE-2017-5466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5467">CVE-2017-5467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5469">CVE-2017-5469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822954" comment="firefox-52.1.0-2.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:436" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1108.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1108.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3509">CVE-2017-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3511">CVE-2017-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3526">CVE-2017-3526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3533">CVE-2017-3533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3539">CVE-2017-3539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3544">CVE-2017-3544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822955" comment="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822956" comment="java-1.8.0-openjdk-accessibility-1.8.0.131-2.b11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822957" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.131-2.b11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822958" comment="java-1.8.0-openjdk-debug-1.8.0.131-2.b11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822959" comment="java-1.8.0-openjdk-demo-1.8.0.131-2.b11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822960" comment="java-1.8.0-openjdk-demo-debug-1.8.0.131-2.b11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822961" comment="java-1.8.0-openjdk-devel-1.8.0.131-2.b11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822962" comment="java-1.8.0-openjdk-devel-debug-1.8.0.131-2.b11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822963" comment="java-1.8.0-openjdk-headless-1.8.0.131-2.b11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822964" comment="java-1.8.0-openjdk-headless-debug-1.8.0.131-2.b11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822965" comment="java-1.8.0-openjdk-javadoc-1.8.0.131-2.b11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822966" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.131-2.b11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822967" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.131-2.b11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822968" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.131-2.b11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822969" comment="java-1.8.0-openjdk-src-1.8.0.131-2.b11.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822970" comment="java-1.8.0-openjdk-src-debug-1.8.0.131-2.b11.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:437" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195/" source="CVE"/>
		<reference ref_id="CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196/" source="CVE"/>
		<reference ref_id="CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1201.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1201.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10195">CVE-2016-10195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10196">CVE-2016-10196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10197">CVE-2016-10197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5429">CVE-2017-5429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5432">CVE-2017-5432 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5433">CVE-2017-5433 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5434">CVE-2017-5434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5435">CVE-2017-5435 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5438">CVE-2017-5438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5439">CVE-2017-5439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5440">CVE-2017-5440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5441">CVE-2017-5441 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5442">CVE-2017-5442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5443">CVE-2017-5443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5444">CVE-2017-5444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5445">CVE-2017-5445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5446">CVE-2017-5446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5447">CVE-2017-5447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5449">CVE-2017-5449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5451">CVE-2017-5451 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5454">CVE-2017-5454 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5459">CVE-2017-5459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5460">CVE-2017-5460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5464">CVE-2017-5464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5465">CVE-2017-5465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5466">CVE-2017-5466 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5467">CVE-2017-5467 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5469">CVE-2017-5469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822971" comment="thunderbird-52.1.0-1.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:438" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1204.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1204.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3509">CVE-2017-3509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3511">CVE-2017-3511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3526">CVE-2017-3526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3533">CVE-2017-3533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3539">CVE-2017-3539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3544">CVE-2017-3544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822972" comment="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822973" comment="java-1.7.0-openjdk-accessibility-1.7.0.141-2.6.10.1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822974" comment="java-1.7.0-openjdk-demo-1.7.0.141-2.6.10.1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822975" comment="java-1.7.0-openjdk-devel-1.7.0.141-2.6.10.1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822976" comment="java-1.7.0-openjdk-headless-1.7.0.141-2.6.10.1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822977" comment="java-1.7.0-openjdk-javadoc-1.7.0.141-2.6.10.1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822978" comment="java-1.7.0-openjdk-src-1.7.0.141-2.6.10.1.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:439" version="1" class="patch">
	<metadata>
		<title>security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-10248" ref_url="https://www.suse.com/security/cve/CVE-2016-10248/" source="CVE"/>
		<reference ref_id="CVE-2016-10249" ref_url="https://www.suse.com/security/cve/CVE-2016-10249/" source="CVE"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9387" ref_url="https://www.suse.com/security/cve/CVE-2016-9387/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1208.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1208.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5203">CVE-2015-5203 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5221">CVE-2015-5221 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10248/">CVE-2016-10248 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10248">CVE-2016-10248 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10249/">CVE-2016-10249 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10249">CVE-2016-10249 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10251">CVE-2016-10251 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1577">CVE-2016-1577 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1867">CVE-2016-1867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2089">CVE-2016-2089 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2116">CVE-2016-2116 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8654">CVE-2016-8654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8690">CVE-2016-8690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8691">CVE-2016-8691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8692">CVE-2016-8692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8693">CVE-2016-8693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8883">CVE-2016-8883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8884">CVE-2016-8884 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8885">CVE-2016-8885 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9262">CVE-2016-9262 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-9387/">CVE-2016-9387 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9387">CVE-2016-9387 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9388">CVE-2016-9388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9389">CVE-2016-9389 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9390">CVE-2016-9390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9391">CVE-2016-9391 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9392">CVE-2016-9392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9393">CVE-2016-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9394">CVE-2016-9394 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9560">CVE-2016-9560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9583">CVE-2016-9583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9591">CVE-2016-9591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9600">CVE-2016-9600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822979" comment="jasper-1.900.1-30.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822980" comment="jasper-devel-1.900.1-30.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822981" comment="jasper-libs-1.900.1-30.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822982" comment="jasper-utils-1.900.1-30.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:440" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1230.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1230.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8291">CVE-2017-8291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822983" comment="ghostscript-9.07-20.el7_3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822984" comment="ghostscript-cups-9.07-20.el7_3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822985" comment="ghostscript-devel-9.07-20.el7_3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822986" comment="ghostscript-doc-9.07-20.el7_3.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822987" comment="ghostscript-gtk-9.07-20.el7_3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:441" version="1" class="patch">
	<metadata>
		<title>security update for rpcbind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1262.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1262.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8779">CVE-2017-8779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822988" comment="rpcbind-0.2.0-38.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:442" version="1" class="patch">
	<metadata>
		<title>security update for libtirpc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1263.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1263.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8779">CVE-2017-8779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822989" comment="libtirpc-0.2.4-0.8.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822990" comment="libtirpc-devel-0.2.4-0.8.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:443" version="1" class="patch">
	<metadata>
		<title>security update for kdelibs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-8422" ref_url="https://www.suse.com/security/cve/CVE-2017-8422/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1264.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1264.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8422/">CVE-2017-8422 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8422">CVE-2017-8422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822991" comment="kdelibs-4.14.8-6.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822992" comment="kdelibs-apidocs-4.14.8-6.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822993" comment="kdelibs-common-4.14.8-6.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822994" comment="kdelibs-devel-4.14.8-6.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822995" comment="kdelibs-ktexteditor-4.14.8-6.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:444" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1265.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1265.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2125">CVE-2016-2125 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2126">CVE-2016-2126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2619">CVE-2017-2619 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009822996" comment="ctdb-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822997" comment="ctdb-tests-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822998" comment="libsmbclient-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009822999" comment="libsmbclient-devel-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823000" comment="libwbclient-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823001" comment="libwbclient-devel-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823002" comment="samba-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823003" comment="samba-client-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823004" comment="samba-client-libs-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823005" comment="samba-common-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823006" comment="samba-common-libs-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823007" comment="samba-common-tools-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823008" comment="samba-dc-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823009" comment="samba-dc-libs-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823010" comment="samba-devel-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823011" comment="samba-krb5-printing-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823012" comment="samba-libs-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823013" comment="samba-pidl-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823014" comment="samba-python-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823015" comment="samba-test-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823016" comment="samba-test-libs-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823017" comment="samba-vfs-glusterfs-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823018" comment="samba-winbind-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823019" comment="samba-winbind-clients-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823020" comment="samba-winbind-krb5-locator-4.4.4-13.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823021" comment="samba-winbind-modules-4.4.4-13.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:445" version="1" class="patch">
	<metadata>
		<title>security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1270.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1270.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7494">CVE-2017-7494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823022" comment="ctdb-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823023" comment="ctdb-tests-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823024" comment="libsmbclient-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823025" comment="libsmbclient-devel-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823026" comment="libwbclient-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823027" comment="libwbclient-devel-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823028" comment="samba-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823029" comment="samba-client-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823030" comment="samba-client-libs-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823031" comment="samba-common-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823032" comment="samba-common-libs-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823033" comment="samba-common-tools-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823034" comment="samba-dc-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823035" comment="samba-dc-libs-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823036" comment="samba-devel-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823037" comment="samba-krb5-printing-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823038" comment="samba-libs-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823039" comment="samba-pidl-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823040" comment="samba-python-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823041" comment="samba-test-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823042" comment="samba-test-libs-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823043" comment="samba-vfs-glusterfs-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823044" comment="samba-winbind-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823045" comment="samba-winbind-clients-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823046" comment="samba-winbind-krb5-locator-4.4.4-14.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823047" comment="samba-winbind-modules-4.4.4-14.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:446" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-10208" ref_url="https://www.suse.com/security/cve/CVE-2016-10208/" source="CVE"/>
		<reference ref_id="CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910/" source="CVE"/>
		<reference ref_id="CVE-2016-8646" ref_url="https://www.suse.com/security/cve/CVE-2016-8646/" source="CVE"/>
		<reference ref_id="CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986/" source="CVE"/>
		<reference ref_id="CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1308.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1308.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10208/">CVE-2016-10208 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10208">CVE-2016-10208 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7910">CVE-2016-7910 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8646/">CVE-2016-8646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8646">CVE-2016-8646 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5986">CVE-2017-5986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7308">CVE-2017-7308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823048" comment="kernel-3.10.0-514.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823049" comment="kernel-abi-whitelists-3.10.0-514.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823050" comment="kernel-debug-3.10.0-514.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823053" comment="kernel-doc-3.10.0-514.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823054" comment="kernel-headers-3.10.0-514.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823055" comment="kernel-tools-3.10.0-514.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823056" comment="kernel-tools-libs-3.10.0-514.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823058" comment="perf-3.10.0-514.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823059" comment="python-perf-3.10.0-514.21.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:447" version="1" class="patch">
	<metadata>
		<title>security update for nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7502" ref_url="https://www.suse.com/security/cve/CVE-2017-7502/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1365.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1365.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7502/">CVE-2017-7502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7502">CVE-2017-7502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823060" comment="nss-3.28.4-1.2.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823061" comment="nss-devel-3.28.4-1.2.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823062" comment="nss-pkcs11-devel-3.28.4-1.2.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823063" comment="nss-sysinit-3.28.4-1.2.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823064" comment="nss-tools-3.28.4-1.2.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:448" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1382.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1382.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000367">CVE-2017-1000367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823065" comment="sudo-1.8.6p7-22.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823066" comment="sudo-devel-1.8.6p7-22.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:449" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718/" source="CVE"/>
		<reference ref_id="CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1430.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1430.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7718">CVE-2017-7718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7980">CVE-2017-7980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823067" comment="qemu-img-1.5.3-126.el7_3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823068" comment="qemu-kvm-1.5.3-126.el7_3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823069" comment="qemu-kvm-common-1.5.3-126.el7_3.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823070" comment="qemu-kvm-tools-1.5.3-126.el7_3.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:450" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7771" ref_url="https://www.suse.com/security/cve/CVE-2017-7771/" source="CVE"/>
		<reference ref_id="CVE-2017-7772" ref_url="https://www.suse.com/security/cve/CVE-2017-7772/" source="CVE"/>
		<reference ref_id="CVE-2017-7773" ref_url="https://www.suse.com/security/cve/CVE-2017-7773/" source="CVE"/>
		<reference ref_id="CVE-2017-7774" ref_url="https://www.suse.com/security/cve/CVE-2017-7774/" source="CVE"/>
		<reference ref_id="CVE-2017-7775" ref_url="https://www.suse.com/security/cve/CVE-2017-7775/" source="CVE"/>
		<reference ref_id="CVE-2017-7776" ref_url="https://www.suse.com/security/cve/CVE-2017-7776/" source="CVE"/>
		<reference ref_id="CVE-2017-7777" ref_url="https://www.suse.com/security/cve/CVE-2017-7777/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1440.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1440.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5470">CVE-2017-5470 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5472">CVE-2017-5472 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7749">CVE-2017-7749 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7750">CVE-2017-7750 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7751">CVE-2017-7751 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7752">CVE-2017-7752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7754">CVE-2017-7754 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7756">CVE-2017-7756 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7757">CVE-2017-7757 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7758">CVE-2017-7758 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7764">CVE-2017-7764 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7771/">CVE-2017-7771 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7771">CVE-2017-7771 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7772/">CVE-2017-7772 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7772">CVE-2017-7772 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7773/">CVE-2017-7773 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7773">CVE-2017-7773 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7774/">CVE-2017-7774 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7774">CVE-2017-7774 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7775/">CVE-2017-7775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-7775">CVE-2017-7775 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7776/">CVE-2017-7776 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7776">CVE-2017-7776 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7777/">CVE-2017-7777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7777">CVE-2017-7777 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7778">CVE-2017-7778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823071" comment="firefox-52.2.0-1.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:451" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1481.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1481.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000366">CVE-2017-1000366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823072" comment="glibc-2.17-157.el7_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823073" comment="glibc-common-2.17-157.el7_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823074" comment="glibc-devel-2.17-157.el7_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823075" comment="glibc-headers-2.17-157.el7_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823076" comment="glibc-static-2.17-157.el7_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823077" comment="glibc-utils-2.17-157.el7_3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823078" comment="nscd-2.17-157.el7_3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:452" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1484.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1484.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000364">CVE-2017-1000364 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823079" comment="kernel-3.10.0-514.21.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823080" comment="kernel-abi-whitelists-3.10.0-514.21.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823081" comment="kernel-debug-3.10.0-514.21.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823084" comment="kernel-doc-3.10.0-514.21.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823085" comment="kernel-headers-3.10.0-514.21.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823086" comment="kernel-tools-3.10.0-514.21.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823087" comment="kernel-tools-libs-3.10.0-514.21.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823089" comment="perf-3.10.0-514.21.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823090" comment="python-perf-3.10.0-514.21.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:453" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7771" ref_url="https://www.suse.com/security/cve/CVE-2017-7771/" source="CVE"/>
		<reference ref_id="CVE-2017-7772" ref_url="https://www.suse.com/security/cve/CVE-2017-7772/" source="CVE"/>
		<reference ref_id="CVE-2017-7773" ref_url="https://www.suse.com/security/cve/CVE-2017-7773/" source="CVE"/>
		<reference ref_id="CVE-2017-7774" ref_url="https://www.suse.com/security/cve/CVE-2017-7774/" source="CVE"/>
		<reference ref_id="CVE-2017-7775" ref_url="https://www.suse.com/security/cve/CVE-2017-7775/" source="CVE"/>
		<reference ref_id="CVE-2017-7776" ref_url="https://www.suse.com/security/cve/CVE-2017-7776/" source="CVE"/>
		<reference ref_id="CVE-2017-7777" ref_url="https://www.suse.com/security/cve/CVE-2017-7777/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1561.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1561.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5470">CVE-2017-5470 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5472">CVE-2017-5472 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7749">CVE-2017-7749 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7750">CVE-2017-7750 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7751">CVE-2017-7751 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7752">CVE-2017-7752 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7754">CVE-2017-7754 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7756">CVE-2017-7756 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7757">CVE-2017-7757 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7758">CVE-2017-7758 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7764">CVE-2017-7764 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7771/">CVE-2017-7771 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7771">CVE-2017-7771 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7772/">CVE-2017-7772 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7772">CVE-2017-7772 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7773/">CVE-2017-7773 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7773">CVE-2017-7773 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7774/">CVE-2017-7774 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7774">CVE-2017-7774 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7775/">CVE-2017-7775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-7775">CVE-2017-7775 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7776/">CVE-2017-7776 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7776">CVE-2017-7776 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7777/">CVE-2017-7777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7777">CVE-2017-7777 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7778">CVE-2017-7778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823091" comment="thunderbird-52.2.0-1.el7_3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:454" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1574.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1574.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000368">CVE-2017-1000368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823092" comment="sudo-1.8.6p7-23.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823093" comment="sudo-devel-1.8.6p7-23.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:455" version="1" class="patch">
	<metadata>
		<title>security update for mercurial (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-9462" ref_url="https://www.suse.com/security/cve/CVE-2017-9462/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1576.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1576.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9462/">CVE-2017-9462 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9462">CVE-2017-9462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823094" comment="emacs-mercurial-2.6.2-7.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823095" comment="emacs-mercurial-el-2.6.2-7.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823096" comment="mercurial-2.6.2-7.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823097" comment="mercurial-hgk-2.6.2-7.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:456" version="1" class="patch">
	<metadata>
		<title>security update for freeradius (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-9148" ref_url="https://www.suse.com/security/cve/CVE-2017-9148/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1581.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1581.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9148/">CVE-2017-9148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9148">CVE-2017-9148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823098" comment="freeradius-3.0.4-8.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823099" comment="freeradius-devel-3.0.4-8.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823100" comment="freeradius-doc-3.0.4-8.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823101" comment="freeradius-krb5-3.0.4-8.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823102" comment="freeradius-ldap-3.0.4-8.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823103" comment="freeradius-mysql-3.0.4-8.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823104" comment="freeradius-perl-3.0.4-8.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823105" comment="freeradius-postgresql-3.0.4-8.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823106" comment="freeradius-python-3.0.4-8.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823107" comment="freeradius-sqlite-3.0.4-8.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823108" comment="freeradius-unixODBC-3.0.4-8.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823109" comment="freeradius-utils-3.0.4-8.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:457" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-2583" ref_url="https://www.suse.com/security/cve/CVE-2017-2583/" source="CVE"/>
		<reference ref_id="CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214/" source="CVE"/>
		<reference ref_id="CVE-2017-7477" ref_url="https://www.suse.com/security/cve/CVE-2017-7477/" source="CVE"/>
		<reference ref_id="CVE-2017-7645" ref_url="https://www.suse.com/security/cve/CVE-2017-7645/" source="CVE"/>
		<reference ref_id="CVE-2017-7895" ref_url="https://www.suse.com/security/cve/CVE-2017-7895/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1615.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1615.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2583/">CVE-2017-2583 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2583">CVE-2017-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6214">CVE-2017-6214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7477/">CVE-2017-7477 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7477">CVE-2017-7477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7645/">CVE-2017-7645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7645">CVE-2017-7645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7895/">CVE-2017-7895 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7895">CVE-2017-7895 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823110" comment="kernel-3.10.0-514.26.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823111" comment="kernel-abi-whitelists-3.10.0-514.26.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823112" comment="kernel-debug-3.10.0-514.26.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823115" comment="kernel-doc-3.10.0-514.26.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823116" comment="kernel-headers-3.10.0-514.26.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823117" comment="kernel-tools-3.10.0-514.26.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823118" comment="kernel-tools-libs-3.10.0-514.26.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823120" comment="perf-3.10.0-514.26.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823121" comment="python-perf-3.10.0-514.26.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:458" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1680.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1680.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3142">CVE-2017-3142 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3143">CVE-2017-3143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823122" comment="bind-9.9.4-50.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823123" comment="bind-chroot-9.9.4-50.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823124" comment="bind-devel-9.9.4-50.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823125" comment="bind-libs-9.9.4-50.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823126" comment="bind-libs-lite-9.9.4-50.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823127" comment="bind-license-9.9.4-50.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823128" comment="bind-lite-devel-9.9.4-50.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823129" comment="bind-pkcs11-9.9.4-50.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823130" comment="bind-pkcs11-devel-9.9.4-50.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823131" comment="bind-pkcs11-libs-9.9.4-50.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823132" comment="bind-pkcs11-utils-9.9.4-50.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823133" comment="bind-sdb-9.9.4-50.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823134" comment="bind-sdb-chroot-9.9.4-50.el7_3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823135" comment="bind-utils-9.9.4-50.el7_3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:459" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1681.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1681.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9524">CVE-2017-9524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823136" comment="qemu-img-1.5.3-126.el7_3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823137" comment="qemu-kvm-1.5.3-126.el7_3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823138" comment="qemu-kvm-common-1.5.3-126.el7_3.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823139" comment="qemu-kvm-tools-1.5.3-126.el7_3.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:460" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10078" ref_url="https://www.suse.com/security/cve/CVE-2017-10078/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135/" source="CVE"/>
		<reference ref_id="CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193/" source="CVE"/>
		<reference ref_id="CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1789.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1789.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10053">CVE-2017-10053 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10067">CVE-2017-10067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10074">CVE-2017-10074 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10078/">CVE-2017-10078 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10078">CVE-2017-10078 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10081">CVE-2017-10081 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10087">CVE-2017-10087 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10089">CVE-2017-10089 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10090">CVE-2017-10090 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10096">CVE-2017-10096 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10101">CVE-2017-10101 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10102">CVE-2017-10102 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10107">CVE-2017-10107 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10108">CVE-2017-10108 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10109">CVE-2017-10109 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10110">CVE-2017-10110 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10111">CVE-2017-10111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10115">CVE-2017-10115 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10116">CVE-2017-10116 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10135">CVE-2017-10135 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10193">CVE-2017-10193 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10198">CVE-2017-10198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823140" comment="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823141" comment="java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823142" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823143" comment="java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823144" comment="java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823145" comment="java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823146" comment="java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823147" comment="java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823148" comment="java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823149" comment="java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823150" comment="java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823151" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823152" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823153" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823154" comment="java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823155" comment="java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:461" version="1" class="patch">
	<metadata>
		<title>security update for graphite2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-7771" ref_url="https://www.suse.com/security/cve/CVE-2017-7771/" source="CVE"/>
		<reference ref_id="CVE-2017-7772" ref_url="https://www.suse.com/security/cve/CVE-2017-7772/" source="CVE"/>
		<reference ref_id="CVE-2017-7773" ref_url="https://www.suse.com/security/cve/CVE-2017-7773/" source="CVE"/>
		<reference ref_id="CVE-2017-7774" ref_url="https://www.suse.com/security/cve/CVE-2017-7774/" source="CVE"/>
		<reference ref_id="CVE-2017-7775" ref_url="https://www.suse.com/security/cve/CVE-2017-7775/" source="CVE"/>
		<reference ref_id="CVE-2017-7776" ref_url="https://www.suse.com/security/cve/CVE-2017-7776/" source="CVE"/>
		<reference ref_id="CVE-2017-7777" ref_url="https://www.suse.com/security/cve/CVE-2017-7777/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1793.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1793.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7771/">CVE-2017-7771 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7771">CVE-2017-7771 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7772/">CVE-2017-7772 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7772">CVE-2017-7772 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7773/">CVE-2017-7773 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7773">CVE-2017-7773 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7774/">CVE-2017-7774 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7774">CVE-2017-7774 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7775/">CVE-2017-7775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-7775">CVE-2017-7775 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7776/">CVE-2017-7776 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7776">CVE-2017-7776 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7777/">CVE-2017-7777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7777">CVE-2017-7777 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7778">CVE-2017-7778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823156" comment="graphite2-1.3.10-1.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823157" comment="graphite2-devel-1.3.10-1.el7_3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:462" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5648" ref_url="https://www.suse.com/security/cve/CVE-2017-5648/" source="CVE"/>
		<reference ref_id="CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1809.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1809.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5648/">CVE-2017-5648 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5648">CVE-2017-5648 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5664">CVE-2017-5664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823158" comment="tomcat-7.0.69-12.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823159" comment="tomcat-admin-webapps-7.0.69-12.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823160" comment="tomcat-docs-webapp-7.0.69-12.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823161" comment="tomcat-el-2.2-api-7.0.69-12.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823162" comment="tomcat-javadoc-7.0.69-12.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823163" comment="tomcat-jsp-2.2-api-7.0.69-12.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823164" comment="tomcat-jsvc-7.0.69-12.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823165" comment="tomcat-lib-7.0.69-12.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823166" comment="tomcat-servlet-3.0-api-7.0.69-12.el7_3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823167" comment="tomcat-webapps-7.0.69-12.el7_3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:463" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-7970" ref_url="https://www.suse.com/security/cve/CVE-2014-7970/" source="CVE"/>
		<reference ref_id="CVE-2014-7975" ref_url="https://www.suse.com/security/cve/CVE-2014-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-8839" ref_url="https://www.suse.com/security/cve/CVE-2015-8839/" source="CVE"/>
		<reference ref_id="CVE-2015-8970" ref_url="https://www.suse.com/security/cve/CVE-2015-8970/" source="CVE"/>
		<reference ref_id="CVE-2016-10088" ref_url="https://www.suse.com/security/cve/CVE-2016-10088/" source="CVE"/>
		<reference ref_id="CVE-2016-10147" ref_url="https://www.suse.com/security/cve/CVE-2016-10147/" source="CVE"/>
		<reference ref_id="CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200/" source="CVE"/>
		<reference ref_id="CVE-2016-6213" ref_url="https://www.suse.com/security/cve/CVE-2016-6213/" source="CVE"/>
		<reference ref_id="CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042/" source="CVE"/>
		<reference ref_id="CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097/" source="CVE"/>
		<reference ref_id="CVE-2016-8645" ref_url="https://www.suse.com/security/cve/CVE-2016-8645/" source="CVE"/>
		<reference ref_id="CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576/" source="CVE"/>
		<reference ref_id="CVE-2016-9588" ref_url="https://www.suse.com/security/cve/CVE-2016-9588/" source="CVE"/>
		<reference ref_id="CVE-2016-9604" ref_url="https://www.suse.com/security/cve/CVE-2016-9604/" source="CVE"/>
		<reference ref_id="CVE-2016-9685" ref_url="https://www.suse.com/security/cve/CVE-2016-9685/" source="CVE"/>
		<reference ref_id="CVE-2016-9806" ref_url="https://www.suse.com/security/cve/CVE-2016-9806/" source="CVE"/>
		<reference ref_id="CVE-2017-2596" ref_url="https://www.suse.com/security/cve/CVE-2017-2596/" source="CVE"/>
		<reference ref_id="CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647/" source="CVE"/>
		<reference ref_id="CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671/" source="CVE"/>
		<reference ref_id="CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970/" source="CVE"/>
		<reference ref_id="CVE-2017-6001" ref_url="https://www.suse.com/security/cve/CVE-2017-6001/" source="CVE"/>
		<reference ref_id="CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951/" source="CVE"/>
		<reference ref_id="CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187/" source="CVE"/>
		<reference ref_id="CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616/" source="CVE"/>
		<reference ref_id="CVE-2017-7889" ref_url="https://www.suse.com/security/cve/CVE-2017-7889/" source="CVE"/>
		<reference ref_id="CVE-2017-8797" ref_url="https://www.suse.com/security/cve/CVE-2017-8797/" source="CVE"/>
		<reference ref_id="CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890/" source="CVE"/>
		<reference ref_id="CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074/" source="CVE"/>
		<reference ref_id="CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075/" source="CVE"/>
		<reference ref_id="CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076/" source="CVE"/>
		<reference ref_id="CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077/" source="CVE"/>
		<reference ref_id="CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1842.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1842.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7970/">CVE-2014-7970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7970">CVE-2014-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7975/">CVE-2014-7975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7975">CVE-2014-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8839/">CVE-2015-8839 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8839">CVE-2015-8839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8970/">CVE-2015-8970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8970">CVE-2015-8970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10088/">CVE-2016-10088 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10088">CVE-2016-10088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10147/">CVE-2016-10147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10147">CVE-2016-10147 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10200">CVE-2016-10200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6213/">CVE-2016-6213 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6213">CVE-2016-6213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7042">CVE-2016-7042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7097">CVE-2016-7097 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8645/">CVE-2016-8645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8645">CVE-2016-8645 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9576">CVE-2016-9576 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9588/">CVE-2016-9588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9588">CVE-2016-9588 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-9604/">CVE-2016-9604 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9604">CVE-2016-9604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9685/">CVE-2016-9685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9685">CVE-2016-9685 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9806/">CVE-2016-9806 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9806">CVE-2016-9806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2596/">CVE-2017-2596 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2596">CVE-2017-2596 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2647">CVE-2017-2647 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2671">CVE-2017-2671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5970">CVE-2017-5970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6001/">CVE-2017-6001 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6001">CVE-2017-6001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6951">CVE-2017-6951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7187">CVE-2017-7187 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7616">CVE-2017-7616 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7889/">CVE-2017-7889 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7889">CVE-2017-7889 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8797/">CVE-2017-8797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8797">CVE-2017-8797 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8890">CVE-2017-8890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9074">CVE-2017-9074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9075">CVE-2017-9075 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9076">CVE-2017-9076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9077">CVE-2017-9077 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9242">CVE-2017-9242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823168" comment="kernel-3.10.0-693.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823169" comment="kernel-abi-whitelists-3.10.0-693.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823170" comment="kernel-debug-3.10.0-693.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823173" comment="kernel-doc-3.10.0-693.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823174" comment="kernel-headers-3.10.0-693.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823175" comment="kernel-tools-3.10.0-693.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823176" comment="kernel-tools-libs-3.10.0-693.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823178" comment="perf-3.10.0-693.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823179" comment="python-perf-3.10.0-693.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:464" version="1" class="patch">
	<metadata>
		<title>security update for openldap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-9287" ref_url="https://www.suse.com/security/cve/CVE-2017-9287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1852.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1852.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9287/">CVE-2017-9287 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9287">CVE-2017-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823180" comment="openldap-2.4.44-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823181" comment="openldap-clients-2.4.44-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823182" comment="openldap-devel-2.4.44-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823183" comment="openldap-servers-2.4.44-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823184" comment="openldap-servers-sql-2.4.44-5.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:465" version="1" class="patch">
	<metadata>
		<title>security update for pidgin (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-3694" ref_url="https://www.suse.com/security/cve/CVE-2014-3694/" source="CVE"/>
		<reference ref_id="CVE-2014-3695" ref_url="https://www.suse.com/security/cve/CVE-2014-3695/" source="CVE"/>
		<reference ref_id="CVE-2014-3696" ref_url="https://www.suse.com/security/cve/CVE-2014-3696/" source="CVE"/>
		<reference ref_id="CVE-2014-3698" ref_url="https://www.suse.com/security/cve/CVE-2014-3698/" source="CVE"/>
		<reference ref_id="CVE-2017-2640" ref_url="https://www.suse.com/security/cve/CVE-2017-2640/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1854.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1854.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3694/">CVE-2014-3694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3694">CVE-2014-3694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3695/">CVE-2014-3695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3695">CVE-2014-3695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3696/">CVE-2014-3696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3696">CVE-2014-3696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3698/">CVE-2014-3698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3698">CVE-2014-3698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2640/">CVE-2017-2640 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2640">CVE-2017-2640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823185" comment="finch-2.10.11-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823186" comment="finch-devel-2.10.11-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823187" comment="libpurple-2.10.11-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823188" comment="libpurple-devel-2.10.11-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823189" comment="libpurple-perl-2.10.11-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823190" comment="libpurple-tcl-2.10.11-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823191" comment="pidgin-2.10.11-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823192" comment="pidgin-devel-2.10.11-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823193" comment="pidgin-perl-2.10.11-5.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:466" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1856.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1856.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4020">CVE-2016-4020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2633">CVE-2017-2633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5898">CVE-2017-5898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823194" comment="qemu-img-1.5.3-141.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823195" comment="qemu-kvm-1.5.3-141.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823196" comment="qemu-kvm-common-1.5.3-141.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823197" comment="qemu-kvm-tools-1.5.3-141.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:467" version="1" class="patch">
	<metadata>
		<title>security update for golang (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-8932" ref_url="https://www.suse.com/security/cve/CVE-2017-8932/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1859.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1859.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8932/">CVE-2017-8932 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8932">CVE-2017-8932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823198" comment="golang-1.8.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823199" comment="golang-bin-1.8.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823200" comment="golang-docs-1.8.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823201" comment="golang-misc-1.8.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823202" comment="golang-src-1.8.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823203" comment="golang-tests-1.8.3-1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:468" version="1" class="patch">
	<metadata>
		<title>security update for libtasn1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1860.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1860.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2806">CVE-2015-2806 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3622">CVE-2015-3622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823204" comment="libtasn1-4.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823205" comment="libtasn1-devel-4.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823206" comment="libtasn1-tools-4.10-1.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823204" comment="libtasn1-4.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823205" comment="libtasn1-devel-4.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823206" comment="libtasn1-tools-4.10-1.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:469" version="1" class="patch">
	<metadata>
		<title>security update for libICE (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164/" source="CVE"/>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1865.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1865.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10164">CVE-2016-10164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2625">CVE-2017-2625 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2626">CVE-2017-2626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823207" comment="drm-utils-2.4.74-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823208" comment="libICE-1.0.9-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823209" comment="libICE-devel-1.0.9-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823210" comment="libX11-1.6.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823211" comment="libX11-common-1.6.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823212" comment="libX11-devel-1.6.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823213" comment="libXaw-1.0.13-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823214" comment="libXaw-devel-1.0.13-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823215" comment="libXcursor-1.1.14-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823216" comment="libXcursor-devel-1.1.14-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823217" comment="libXdmcp-1.1.2-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823218" comment="libXdmcp-devel-1.1.2-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823219" comment="libXfixes-5.0.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823220" comment="libXfixes-devel-5.0.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823221" comment="libXfont-1.5.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823222" comment="libXfont-devel-1.5.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823223" comment="libXfont2-2.0.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823224" comment="libXfont2-devel-2.0.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823225" comment="libXi-1.7.9-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823226" comment="libXi-devel-1.7.9-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823227" comment="libXpm-3.5.12-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823228" comment="libXpm-devel-3.5.12-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823229" comment="libXrandr-1.5.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823230" comment="libXrandr-devel-1.5.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823231" comment="libXrender-0.9.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823232" comment="libXrender-devel-0.9.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823233" comment="libXt-1.1.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823234" comment="libXt-devel-1.1.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823235" comment="libXtst-1.2.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823236" comment="libXtst-devel-1.2.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823237" comment="libXv-1.0.11-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823238" comment="libXv-devel-1.0.11-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823239" comment="libXvMC-1.0.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823240" comment="libXvMC-devel-1.0.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823241" comment="libXxf86vm-1.1.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823242" comment="libXxf86vm-devel-1.1.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823243" comment="libdrm-2.4.74-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823244" comment="libdrm-devel-2.4.74-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823245" comment="libepoxy-1.3.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823246" comment="libepoxy-devel-1.3.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823247" comment="libevdev-1.5.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823248" comment="libevdev-devel-1.5.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823249" comment="libevdev-utils-1.5.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823250" comment="libfontenc-1.1.3-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823251" comment="libfontenc-devel-1.1.3-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823252" comment="libinput-1.6.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823253" comment="libinput-devel-1.6.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823254" comment="libvdpau-1.1.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823255" comment="libvdpau-devel-1.1.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823256" comment="libvdpau-docs-1.1.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823257" comment="libwacom-0.24-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823258" comment="libwacom-data-0.24-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823259" comment="libwacom-devel-0.24-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823260" comment="libxcb-1.12-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823261" comment="libxcb-devel-1.12-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823262" comment="libxcb-doc-1.12-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823263" comment="libxkbcommon-0.7.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823264" comment="libxkbcommon-devel-0.7.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823265" comment="libxkbcommon-x11-0.7.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823266" comment="libxkbcommon-x11-devel-0.7.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823267" comment="libxkbfile-1.0.9-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823268" comment="libxkbfile-devel-1.0.9-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823269" comment="mesa-dri-drivers-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823270" comment="mesa-filesystem-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823271" comment="mesa-libEGL-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823272" comment="mesa-libEGL-devel-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823273" comment="mesa-libGL-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823274" comment="mesa-libGL-devel-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823275" comment="mesa-libGLES-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823276" comment="mesa-libGLES-devel-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823277" comment="mesa-libOSMesa-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823278" comment="mesa-libOSMesa-devel-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823279" comment="mesa-libgbm-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823280" comment="mesa-libgbm-devel-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823281" comment="mesa-libglapi-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823282" comment="mesa-libxatracker-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823283" comment="mesa-libxatracker-devel-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823284" comment="mesa-private-llvm-3.9.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823285" comment="mesa-private-llvm-devel-3.9.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823286" comment="mesa-vulkan-drivers-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823287" comment="vulkan-1.0.39.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823288" comment="vulkan-devel-1.0.39.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823289" comment="vulkan-filesystem-1.0.39.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823290" comment="xcb-proto-1.12-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823291" comment="xkeyboard-config-2.20-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823292" comment="xkeyboard-config-devel-2.20-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823293" comment="xorg-x11-proto-devel-7.7-20.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823207" comment="drm-utils-2.4.74-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823208" comment="libICE-1.0.9-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823209" comment="libICE-devel-1.0.9-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823210" comment="libX11-1.6.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823211" comment="libX11-common-1.6.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823212" comment="libX11-devel-1.6.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823213" comment="libXaw-1.0.13-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823214" comment="libXaw-devel-1.0.13-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823215" comment="libXcursor-1.1.14-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823216" comment="libXcursor-devel-1.1.14-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823217" comment="libXdmcp-1.1.2-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823218" comment="libXdmcp-devel-1.1.2-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823219" comment="libXfixes-5.0.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823220" comment="libXfixes-devel-5.0.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823221" comment="libXfont-1.5.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823222" comment="libXfont-devel-1.5.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823223" comment="libXfont2-2.0.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823224" comment="libXfont2-devel-2.0.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823225" comment="libXi-1.7.9-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823226" comment="libXi-devel-1.7.9-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823227" comment="libXpm-3.5.12-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823228" comment="libXpm-devel-3.5.12-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823229" comment="libXrandr-1.5.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823230" comment="libXrandr-devel-1.5.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823231" comment="libXrender-0.9.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823232" comment="libXrender-devel-0.9.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823233" comment="libXt-1.1.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823234" comment="libXt-devel-1.1.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823235" comment="libXtst-1.2.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823236" comment="libXtst-devel-1.2.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823237" comment="libXv-1.0.11-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823238" comment="libXv-devel-1.0.11-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823239" comment="libXvMC-1.0.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823240" comment="libXvMC-devel-1.0.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823241" comment="libXxf86vm-1.1.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823242" comment="libXxf86vm-devel-1.1.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823243" comment="libdrm-2.4.74-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823244" comment="libdrm-devel-2.4.74-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823245" comment="libepoxy-1.3.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823246" comment="libepoxy-devel-1.3.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823247" comment="libevdev-1.5.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823248" comment="libevdev-devel-1.5.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823249" comment="libevdev-utils-1.5.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823250" comment="libfontenc-1.1.3-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823251" comment="libfontenc-devel-1.1.3-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823252" comment="libinput-1.6.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823253" comment="libinput-devel-1.6.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823254" comment="libvdpau-1.1.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823255" comment="libvdpau-devel-1.1.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823256" comment="libvdpau-docs-1.1.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823257" comment="libwacom-0.24-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823258" comment="libwacom-data-0.24-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823259" comment="libwacom-devel-0.24-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823260" comment="libxcb-1.12-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823261" comment="libxcb-devel-1.12-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823262" comment="libxcb-doc-1.12-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823263" comment="libxkbcommon-0.7.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823264" comment="libxkbcommon-devel-0.7.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823265" comment="libxkbcommon-x11-0.7.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823266" comment="libxkbcommon-x11-devel-0.7.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823267" comment="libxkbfile-1.0.9-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823268" comment="libxkbfile-devel-1.0.9-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823269" comment="mesa-dri-drivers-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823270" comment="mesa-filesystem-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823271" comment="mesa-libEGL-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823272" comment="mesa-libEGL-devel-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823273" comment="mesa-libGL-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823274" comment="mesa-libGL-devel-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823275" comment="mesa-libGLES-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823276" comment="mesa-libGLES-devel-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823277" comment="mesa-libOSMesa-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823278" comment="mesa-libOSMesa-devel-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823279" comment="mesa-libgbm-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823280" comment="mesa-libgbm-devel-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823281" comment="mesa-libglapi-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823282" comment="mesa-libxatracker-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823283" comment="mesa-libxatracker-devel-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823284" comment="mesa-private-llvm-3.9.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823285" comment="mesa-private-llvm-devel-3.9.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823286" comment="mesa-vulkan-drivers-17.0.1-6.20170307.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823287" comment="vulkan-1.0.39.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823288" comment="vulkan-devel-1.0.39.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823289" comment="vulkan-filesystem-1.0.39.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823290" comment="xcb-proto-1.12-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823291" comment="xkeyboard-config-2.20-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823292" comment="xkeyboard-config-devel-2.20-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823293" comment="xorg-x11-proto-devel-7.7-20.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:470" version="1" class="patch">
	<metadata>
		<title>security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-9365" ref_url="https://www.suse.com/security/cve/CVE-2014-9365/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1868.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1868.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9365/">CVE-2014-9365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9365">CVE-2014-9365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823294" comment="python-2.7.5-58.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823295" comment="python-debug-2.7.5-58.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823296" comment="python-devel-2.7.5-58.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823297" comment="python-libs-2.7.5-58.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823298" comment="python-test-2.7.5-58.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823299" comment="python-tools-2.7.5-58.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823300" comment="tkinter-2.7.5-58.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:471" version="1" class="patch">
	<metadata>
		<title>security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155/" source="CVE"/>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7924" ref_url="https://www.suse.com/security/cve/CVE-2016-7924/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7929" ref_url="https://www.suse.com/security/cve/CVE-2016-7929/" source="CVE"/>
		<reference ref_id="CVE-2016-7930" ref_url="https://www.suse.com/security/cve/CVE-2016-7930/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7932" ref_url="https://www.suse.com/security/cve/CVE-2016-7932/" source="CVE"/>
		<reference ref_id="CVE-2016-7933" ref_url="https://www.suse.com/security/cve/CVE-2016-7933/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7938" ref_url="https://www.suse.com/security/cve/CVE-2016-7938/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7985" ref_url="https://www.suse.com/security/cve/CVE-2016-7985/" source="CVE"/>
		<reference ref_id="CVE-2016-7986" ref_url="https://www.suse.com/security/cve/CVE-2016-7986/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2016-8575" ref_url="https://www.suse.com/security/cve/CVE-2016-8575/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5205" ref_url="https://www.suse.com/security/cve/CVE-2017-5205/" source="CVE"/>
		<reference ref_id="CVE-2017-5341" ref_url="https://www.suse.com/security/cve/CVE-2017-5341/" source="CVE"/>
		<reference ref_id="CVE-2017-5342" ref_url="https://www.suse.com/security/cve/CVE-2017-5342/" source="CVE"/>
		<reference ref_id="CVE-2017-5482" ref_url="https://www.suse.com/security/cve/CVE-2017-5482/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1871.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1871.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0261">CVE-2015-0261 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2153">CVE-2015-2153 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2154">CVE-2015-2154 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2155">CVE-2015-2155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7922">CVE-2016-7922 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7923">CVE-2016-7923 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7924/">CVE-2016-7924 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7924">CVE-2016-7924 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7925">CVE-2016-7925 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7926">CVE-2016-7926 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7927">CVE-2016-7927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7928">CVE-2016-7928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7929/">CVE-2016-7929 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7929">CVE-2016-7929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7930/">CVE-2016-7930 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7930">CVE-2016-7930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7931">CVE-2016-7931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7932/">CVE-2016-7932 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7932">CVE-2016-7932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7933/">CVE-2016-7933 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7933">CVE-2016-7933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7934">CVE-2016-7934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7935">CVE-2016-7935 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7936">CVE-2016-7936 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7937">CVE-2016-7937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7938/">CVE-2016-7938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7938">CVE-2016-7938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7939">CVE-2016-7939 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7940">CVE-2016-7940 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7973">CVE-2016-7973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7974">CVE-2016-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7975">CVE-2016-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7983">CVE-2016-7983 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7984">CVE-2016-7984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7985/">CVE-2016-7985 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7985">CVE-2016-7985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7986/">CVE-2016-7986 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7986">CVE-2016-7986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7992">CVE-2016-7992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7993">CVE-2016-7993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8574">CVE-2016-8574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8575/">CVE-2016-8575 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8575">CVE-2016-8575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5202">CVE-2017-5202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5203">CVE-2017-5203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5204">CVE-2017-5204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5205/">CVE-2017-5205 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5205">CVE-2017-5205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5341/">CVE-2017-5341 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5341">CVE-2017-5341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5342/">CVE-2017-5342 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5342">CVE-2017-5342 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5482/">CVE-2017-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5482">CVE-2017-5482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5483">CVE-2017-5483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5484">CVE-2017-5484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5485">CVE-2017-5485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5486">CVE-2017-5486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823301" comment="tcpdump-4.9.0-5.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:472" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1916.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1916.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9761">CVE-2014-9761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8776">CVE-2015-8776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8777">CVE-2015-8777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8778">CVE-2015-8778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8779">CVE-2015-8779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823302" comment="glibc-2.17-196.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823303" comment="glibc-common-2.17-196.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823304" comment="glibc-devel-2.17-196.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823305" comment="glibc-headers-2.17-196.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823306" comment="glibc-static-2.17-196.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823307" comment="glibc-utils-2.17-196.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823308" comment="nscd-2.17-196.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:473" version="1" class="patch">
	<metadata>
		<title>security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634/" source="CVE"/>
		<reference ref_id="CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543/" source="CVE"/>
		<reference ref_id="CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1931.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1931.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0634">CVE-2016-0634 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7543">CVE-2016-7543 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9401">CVE-2016-9401 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823309" comment="bash-4.2.46-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823310" comment="bash-doc-4.2.46-28.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:474" version="1" class="patch">
	<metadata>
		<title>security update for samba (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-9461" ref_url="https://www.suse.com/security/cve/CVE-2017-9461/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1950.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1950.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9461/">CVE-2017-9461 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9461">CVE-2017-9461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823311" comment="ctdb-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823312" comment="ctdb-tests-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823313" comment="libsmbclient-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823314" comment="libsmbclient-devel-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823315" comment="libwbclient-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823316" comment="libwbclient-devel-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823317" comment="samba-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823318" comment="samba-client-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823319" comment="samba-client-libs-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823320" comment="samba-common-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823321" comment="samba-common-libs-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823322" comment="samba-common-tools-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823323" comment="samba-dc-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823324" comment="samba-dc-libs-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823325" comment="samba-devel-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823326" comment="samba-krb5-printing-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823327" comment="samba-libs-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823328" comment="samba-pidl-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823329" comment="samba-python-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823330" comment="samba-test-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823331" comment="samba-test-libs-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823332" comment="samba-vfs-glusterfs-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823333" comment="samba-winbind-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823334" comment="samba-winbind-clients-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823335" comment="samba-winbind-krb5-locator-4.6.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823336" comment="samba-winbind-modules-4.6.2-8.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:475" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484/" source="CVE"/>
		<reference ref_id="CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:1983.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:1983.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7484">CVE-2017-7484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7486">CVE-2017-7486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823337" comment="postgresql-9.2.21-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823338" comment="postgresql-contrib-9.2.21-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823339" comment="postgresql-devel-9.2.21-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823340" comment="postgresql-docs-9.2.21-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823341" comment="postgresql-libs-9.2.21-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823342" comment="postgresql-plperl-9.2.21-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823343" comment="postgresql-plpython-9.2.21-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823344" comment="postgresql-pltcl-9.2.21-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823345" comment="postgresql-server-9.2.21-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823346" comment="postgresql-static-9.2.21-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823347" comment="postgresql-test-9.2.21-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823348" comment="postgresql-upgrade-9.2.21-1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:476" version="1" class="patch">
	<metadata>
		<title>security update for fltk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-10207" ref_url="https://www.suse.com/security/cve/CVE-2016-10207/" source="CVE"/>
		<reference ref_id="CVE-2017-5581" ref_url="https://www.suse.com/security/cve/CVE-2017-5581/" source="CVE"/>
		<reference ref_id="CVE-2017-7392" ref_url="https://www.suse.com/security/cve/CVE-2017-7392/" source="CVE"/>
		<reference ref_id="CVE-2017-7393" ref_url="https://www.suse.com/security/cve/CVE-2017-7393/" source="CVE"/>
		<reference ref_id="CVE-2017-7394" ref_url="https://www.suse.com/security/cve/CVE-2017-7394/" source="CVE"/>
		<reference ref_id="CVE-2017-7395" ref_url="https://www.suse.com/security/cve/CVE-2017-7395/" source="CVE"/>
		<reference ref_id="CVE-2017-7396" ref_url="https://www.suse.com/security/cve/CVE-2017-7396/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2000.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2000.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10207/">CVE-2016-10207 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10207">CVE-2016-10207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5581/">CVE-2017-5581 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5581">CVE-2017-5581 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7392/">CVE-2017-7392 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7392">CVE-2017-7392 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7393/">CVE-2017-7393 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7393">CVE-2017-7393 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7394/">CVE-2017-7394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7394">CVE-2017-7394 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7395/">CVE-2017-7395 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7395">CVE-2017-7395 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7396/">CVE-2017-7396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7396">CVE-2017-7396 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823349" comment="fltk-1.3.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823350" comment="fltk-devel-1.3.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823351" comment="fltk-fluid-1.3.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823352" comment="fltk-static-1.3.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823353" comment="tigervnc-1.8.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823354" comment="tigervnc-icons-1.8.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823355" comment="tigervnc-license-1.8.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823356" comment="tigervnc-server-1.8.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823357" comment="tigervnc-server-applet-1.8.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823358" comment="tigervnc-server-minimal-1.8.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823359" comment="tigervnc-server-module-1.8.0-1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:477" version="1" class="patch">
	<metadata>
		<title>security update for git (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-9938" ref_url="https://www.suse.com/security/cve/CVE-2014-9938/" source="CVE"/>
		<reference ref_id="CVE-2017-8386" ref_url="https://www.suse.com/security/cve/CVE-2017-8386/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2004.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2004.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9938/">CVE-2014-9938 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9938">CVE-2014-9938 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8386/">CVE-2017-8386 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8386">CVE-2017-8386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823360" comment="emacs-git-1.8.3.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823361" comment="emacs-git-el-1.8.3.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823362" comment="git-1.8.3.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823363" comment="git-all-1.8.3.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823364" comment="git-bzr-1.8.3.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823365" comment="git-cvs-1.8.3.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823366" comment="git-daemon-1.8.3.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823367" comment="git-email-1.8.3.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823368" comment="git-gui-1.8.3.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823369" comment="git-hg-1.8.3.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823370" comment="git-p4-1.8.3.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823371" comment="git-svn-1.8.3.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823372" comment="gitk-1.8.3.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823373" comment="gitweb-1.8.3.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823374" comment="perl-Git-1.8.3.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823375" comment="perl-Git-SVN-1.8.3.1-11.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:478" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2016.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2016.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7167">CVE-2016-7167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823376" comment="curl-7.29.0-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823377" comment="libcurl-7.29.0-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823378" comment="libcurl-devel-7.29.0-42.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:479" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2029.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2029.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10009">CVE-2016-10009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10011">CVE-2016-10011 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10012">CVE-2016-10012 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6210">CVE-2016-6210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6515">CVE-2016-6515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823379" comment="openssh-7.4p1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823380" comment="openssh-askpass-7.4p1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823381" comment="openssh-cavs-7.4p1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823382" comment="openssh-clients-7.4p1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823383" comment="openssh-keycat-7.4p1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823384" comment="openssh-ldap-7.4p1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823385" comment="openssh-server-7.4p1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823386" comment="openssh-server-sysvinit-7.4p1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823387" comment="pam_ssh_agent_auth-0.10.3-1.11.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:480" version="1" class="patch">
	<metadata>
		<title>security update for clutter-gst2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198/" source="CVE"/>
		<reference ref_id="CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199/" source="CVE"/>
		<reference ref_id="CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446/" source="CVE"/>
		<reference ref_id="CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810/" source="CVE"/>
		<reference ref_id="CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811/" source="CVE"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839/" source="CVE"/>
		<reference ref_id="CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840/" source="CVE"/>
		<reference ref_id="CVE-2017-5841" ref_url="https://www.suse.com/security/cve/CVE-2017-5841/" source="CVE"/>
		<reference ref_id="CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842/" source="CVE"/>
		<reference ref_id="CVE-2017-5843" ref_url="https://www.suse.com/security/cve/CVE-2017-5843/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="CVE-2017-5845" ref_url="https://www.suse.com/security/cve/CVE-2017-5845/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2060.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2060.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10198">CVE-2016-10198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10199">CVE-2016-10199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9446">CVE-2016-9446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9810">CVE-2016-9810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9811">CVE-2016-9811 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5837">CVE-2017-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5838">CVE-2017-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5839">CVE-2017-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5840">CVE-2017-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5841/">CVE-2017-5841 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5841">CVE-2017-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5842">CVE-2017-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5843/">CVE-2017-5843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5843">CVE-2017-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5844">CVE-2017-5844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5845/">CVE-2017-5845 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5845">CVE-2017-5845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5848">CVE-2017-5848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823388" comment="clutter-gst2-2.0.18-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823389" comment="clutter-gst2-devel-2.0.18-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823390" comment="gnome-video-effects-0.4.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823391" comment="gstreamer-plugins-bad-free-0.10.23-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823392" comment="gstreamer-plugins-bad-free-devel-0.10.23-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823393" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823394" comment="gstreamer-plugins-good-0.10.31-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823395" comment="gstreamer-plugins-good-devel-docs-0.10.31-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823396" comment="gstreamer1-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823397" comment="gstreamer1-devel-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823398" comment="gstreamer1-devel-docs-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823399" comment="gstreamer1-plugins-bad-free-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823400" comment="gstreamer1-plugins-bad-free-devel-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823401" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823402" comment="gstreamer1-plugins-base-1.10.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823403" comment="gstreamer1-plugins-base-devel-1.10.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823404" comment="gstreamer1-plugins-base-devel-docs-1.10.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823405" comment="gstreamer1-plugins-base-tools-1.10.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823406" comment="gstreamer1-plugins-good-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823407" comment="orc-0.4.26-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823408" comment="orc-compiler-0.4.26-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823409" comment="orc-devel-0.4.26-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823410" comment="orc-doc-0.4.26-1.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:481" version="1" class="patch">
	<metadata>
		<title>security update for gdm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-7496" ref_url="https://www.suse.com/security/cve/CVE-2015-7496/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2128.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2128.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7496/">CVE-2015-7496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7496">CVE-2015-7496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823411" comment="gdm-3.22.3-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823412" comment="gdm-devel-3.22.3-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823413" comment="gnome-session-3.22.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823414" comment="gnome-session-custom-session-3.22.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823415" comment="gnome-session-xsession-3.22.3-4.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:482" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2180.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2180.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7207">CVE-2017-7207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823416" comment="ghostscript-9.07-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823417" comment="ghostscript-cups-9.07-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823418" comment="ghostscript-devel-9.07-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823419" comment="ghostscript-doc-9.07-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823420" comment="ghostscript-gtk-9.07-28.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:483" version="1" class="patch">
	<metadata>
		<title>security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664/" source="CVE"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="CVE-2017-3600" ref_url="https://www.suse.com/security/cve/CVE-2017-3600/" source="CVE"/>
		<reference ref_id="CVE-2017-3651" ref_url="https://www.suse.com/security/cve/CVE-2017-3651/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2192.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2192.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6664">CVE-2016-6664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3238">CVE-2017-3238 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3243">CVE-2017-3243 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3244">CVE-2017-3244 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3258">CVE-2017-3258 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3265">CVE-2017-3265 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3291">CVE-2017-3291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3302">CVE-2017-3302 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3308">CVE-2017-3308 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3309">CVE-2017-3309 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3312">CVE-2017-3312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3313">CVE-2017-3313 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3317">CVE-2017-3317 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3318">CVE-2017-3318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3453">CVE-2017-3453 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3456">CVE-2017-3456 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3464">CVE-2017-3464 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3600/">CVE-2017-3600 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3600">CVE-2017-3600 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3651/">CVE-2017-3651 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3651">CVE-2017-3651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823421" comment="mariadb-5.5.56-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823422" comment="mariadb-bench-5.5.56-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823423" comment="mariadb-devel-5.5.56-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823424" comment="mariadb-embedded-5.5.56-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823425" comment="mariadb-embedded-devel-5.5.56-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823426" comment="mariadb-libs-5.5.56-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823427" comment="mariadb-server-5.5.56-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823428" comment="mariadb-test-5.5.56-2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:484" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-0762" ref_url="https://www.suse.com/security/cve/CVE-2016-0762/" source="CVE"/>
		<reference ref_id="CVE-2016-5018" ref_url="https://www.suse.com/security/cve/CVE-2016-5018/" source="CVE"/>
		<reference ref_id="CVE-2016-6794" ref_url="https://www.suse.com/security/cve/CVE-2016-6794/" source="CVE"/>
		<reference ref_id="CVE-2016-6796" ref_url="https://www.suse.com/security/cve/CVE-2016-6796/" source="CVE"/>
		<reference ref_id="CVE-2016-6797" ref_url="https://www.suse.com/security/cve/CVE-2016-6797/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2247.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2247.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0762/">CVE-2016-0762 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0762">CVE-2016-0762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5018/">CVE-2016-5018 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5018">CVE-2016-5018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6794/">CVE-2016-6794 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6794">CVE-2016-6794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6796/">CVE-2016-6796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6796">CVE-2016-6796 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6797/">CVE-2016-6797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6797">CVE-2016-6797 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823429" comment="tomcat-7.0.76-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823430" comment="tomcat-admin-webapps-7.0.76-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823431" comment="tomcat-docs-webapp-7.0.76-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823432" comment="tomcat-el-2.2-api-7.0.76-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823433" comment="tomcat-javadoc-7.0.76-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823434" comment="tomcat-jsp-2.2-api-7.0.76-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823435" comment="tomcat-jsvc-7.0.76-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823436" comment="tomcat-lib-7.0.76-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823437" comment="tomcat-servlet-3.0-api-7.0.76-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823438" comment="tomcat-webapps-7.0.76-2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:485" version="1" class="patch">
	<metadata>
		<title>security update for gtk-vnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5884" ref_url="https://www.suse.com/security/cve/CVE-2017-5884/" source="CVE"/>
		<reference ref_id="CVE-2017-5885" ref_url="https://www.suse.com/security/cve/CVE-2017-5885/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2258.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2258.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5884/">CVE-2017-5884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5884">CVE-2017-5884 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5885/">CVE-2017-5885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5885">CVE-2017-5885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823439" comment="gtk-vnc-0.7.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823440" comment="gtk-vnc-devel-0.7.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823441" comment="gtk-vnc-python-0.7.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823442" comment="gtk-vnc2-0.7.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823443" comment="gtk-vnc2-devel-0.7.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823444" comment="gvnc-0.7.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823445" comment="gvnc-devel-0.7.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823446" comment="gvnc-tools-0.7.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823447" comment="gvncpulse-0.7.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823448" comment="gvncpulse-devel-0.7.0-2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:486" version="1" class="patch">
	<metadata>
		<title>security update for authconfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-7488" ref_url="https://www.suse.com/security/cve/CVE-2017-7488/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2285.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2285.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7488/">CVE-2017-7488 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7488">CVE-2017-7488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823449" comment="authconfig-6.2.8-30.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823450" comment="authconfig-gtk-6.2.8-30.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823449" comment="authconfig-6.2.8-30.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823450" comment="authconfig-gtk-6.2.8-30.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:487" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-7444" ref_url="https://www.suse.com/security/cve/CVE-2016-7444/" source="CVE"/>
		<reference ref_id="CVE-2017-5334" ref_url="https://www.suse.com/security/cve/CVE-2017-5334/" source="CVE"/>
		<reference ref_id="CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335/" source="CVE"/>
		<reference ref_id="CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336/" source="CVE"/>
		<reference ref_id="CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337/" source="CVE"/>
		<reference ref_id="CVE-2017-7507" ref_url="https://www.suse.com/security/cve/CVE-2017-7507/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2292.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2292.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7444/">CVE-2016-7444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7444">CVE-2016-7444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5334/">CVE-2017-5334 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5334">CVE-2017-5334 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5335">CVE-2017-5335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5336">CVE-2017-5336 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5337">CVE-2017-5337 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7507/">CVE-2017-7507 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7507">CVE-2017-7507 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7869">CVE-2017-7869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823451" comment="gnutls-3.3.26-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823452" comment="gnutls-c++-3.3.26-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823453" comment="gnutls-dane-3.3.26-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823454" comment="gnutls-devel-3.3.26-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823455" comment="gnutls-utils-3.3.26-9.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:488" version="1" class="patch">
	<metadata>
		<title>security update for NetworkManager (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-0553" ref_url="https://www.suse.com/security/cve/CVE-2017-0553/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2299.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2299.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-0553/">CVE-2017-0553 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0553">CVE-2017-0553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823456" comment="NetworkManager-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823457" comment="NetworkManager-adsl-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823458" comment="NetworkManager-bluetooth-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823459" comment="NetworkManager-config-server-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823460" comment="NetworkManager-dispatcher-routing-rules-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823461" comment="NetworkManager-glib-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823462" comment="NetworkManager-glib-devel-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823463" comment="NetworkManager-libnm-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823464" comment="NetworkManager-libnm-devel-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823465" comment="NetworkManager-libreswan-1.2.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823466" comment="NetworkManager-libreswan-gnome-1.2.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823467" comment="NetworkManager-ppp-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823468" comment="NetworkManager-team-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823469" comment="NetworkManager-tui-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823470" comment="NetworkManager-wifi-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823471" comment="NetworkManager-wwan-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823472" comment="libnl3-3.2.28-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823473" comment="libnl3-cli-3.2.28-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823474" comment="libnl3-devel-3.2.28-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823475" comment="libnl3-doc-3.2.28-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823476" comment="libnm-gtk-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823477" comment="libnm-gtk-devel-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823478" comment="libnma-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823479" comment="libnma-devel-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823480" comment="network-manager-applet-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823481" comment="nm-connection-editor-1.8.0-3.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823456" comment="NetworkManager-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823457" comment="NetworkManager-adsl-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823458" comment="NetworkManager-bluetooth-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823459" comment="NetworkManager-config-server-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823460" comment="NetworkManager-dispatcher-routing-rules-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823461" comment="NetworkManager-glib-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823462" comment="NetworkManager-glib-devel-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823463" comment="NetworkManager-libnm-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823464" comment="NetworkManager-libnm-devel-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823465" comment="NetworkManager-libreswan-1.2.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823466" comment="NetworkManager-libreswan-gnome-1.2.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823467" comment="NetworkManager-ppp-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823468" comment="NetworkManager-team-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823469" comment="NetworkManager-tui-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823470" comment="NetworkManager-wifi-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823471" comment="NetworkManager-wwan-1.8.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823472" comment="libnl3-3.2.28-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823473" comment="libnl3-cli-3.2.28-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823474" comment="libnl3-devel-3.2.28-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823475" comment="libnl3-doc-3.2.28-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823476" comment="libnm-gtk-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823477" comment="libnm-gtk-devel-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823478" comment="libnma-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823479" comment="libnma-devel-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823480" comment="network-manager-applet-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823481" comment="nm-connection-editor-1.8.0-3.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:489" version="1" class="patch">
	<metadata>
		<title>security update for pki-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7537" ref_url="https://www.suse.com/security/cve/CVE-2017-7537/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2335.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2335.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7537/">CVE-2017-7537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7537">CVE-2017-7537 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823482" comment="pki-base-10.4.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823483" comment="pki-base-java-10.4.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823484" comment="pki-ca-10.4.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823485" comment="pki-javadoc-10.4.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823486" comment="pki-kra-10.4.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823487" comment="pki-server-10.4.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823488" comment="pki-symkey-10.4.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823489" comment="pki-tools-10.4.1-11.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:490" version="1" class="patch">
	<metadata>
		<title>security update for evince (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2388.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2388.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000083">CVE-2017-1000083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823490" comment="evince-3.22.1-5.2.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823491" comment="evince-browser-plugin-3.22.1-5.2.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823492" comment="evince-devel-3.22.1-5.2.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823493" comment="evince-dvi-3.22.1-5.2.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823494" comment="evince-libs-3.22.1-5.2.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823495" comment="evince-nautilus-3.22.1-5.2.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:491" version="1" class="patch">
	<metadata>
		<title>security update for freeradius (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-10978" ref_url="https://www.suse.com/security/cve/CVE-2017-10978/" source="CVE"/>
		<reference ref_id="CVE-2017-10983" ref_url="https://www.suse.com/security/cve/CVE-2017-10983/" source="CVE"/>
		<reference ref_id="CVE-2017-10984" ref_url="https://www.suse.com/security/cve/CVE-2017-10984/" source="CVE"/>
		<reference ref_id="CVE-2017-10985" ref_url="https://www.suse.com/security/cve/CVE-2017-10985/" source="CVE"/>
		<reference ref_id="CVE-2017-10986" ref_url="https://www.suse.com/security/cve/CVE-2017-10986/" source="CVE"/>
		<reference ref_id="CVE-2017-10987" ref_url="https://www.suse.com/security/cve/CVE-2017-10987/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2389.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2389.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10978/">CVE-2017-10978 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10978">CVE-2017-10978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10983/">CVE-2017-10983 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10983">CVE-2017-10983 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10984/">CVE-2017-10984 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10984">CVE-2017-10984 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10985/">CVE-2017-10985 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10985">CVE-2017-10985 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10986/">CVE-2017-10986 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10986">CVE-2017-10986 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10987/">CVE-2017-10987 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10987">CVE-2017-10987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823496" comment="freeradius-3.0.13-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823497" comment="freeradius-devel-3.0.13-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823498" comment="freeradius-doc-3.0.13-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823499" comment="freeradius-krb5-3.0.13-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823500" comment="freeradius-ldap-3.0.13-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823501" comment="freeradius-mysql-3.0.13-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823502" comment="freeradius-perl-3.0.13-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823503" comment="freeradius-postgresql-3.0.13-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823504" comment="freeradius-python-3.0.13-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823505" comment="freeradius-sqlite-3.0.13-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823506" comment="freeradius-unixODBC-3.0.13-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823507" comment="freeradius-utils-3.0.13-8.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:492" version="1" class="patch">
	<metadata>
		<title>security update for log4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5645" ref_url="https://www.suse.com/security/cve/CVE-2017-5645/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2423.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2423.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5645/">CVE-2017-5645 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5645">CVE-2017-5645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823508" comment="log4j-1.2.17-16.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823509" comment="log4j-javadoc-1.2.17-16.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823510" comment="log4j-manual-1.2.17-16.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:493" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2424.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2424.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10053">CVE-2017-10053 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10067">CVE-2017-10067 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10074">CVE-2017-10074 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10081">CVE-2017-10081 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10087">CVE-2017-10087 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10089">CVE-2017-10089 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10090">CVE-2017-10090 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10096">CVE-2017-10096 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10101">CVE-2017-10101 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10102">CVE-2017-10102 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10107">CVE-2017-10107 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10108">CVE-2017-10108 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10109">CVE-2017-10109 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10110">CVE-2017-10110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10115">CVE-2017-10115 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10116">CVE-2017-10116 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10135">CVE-2017-10135 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10243">CVE-2017-10243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823511" comment="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823512" comment="java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823513" comment="java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823514" comment="java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823515" comment="java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823516" comment="java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823517" comment="java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:494" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2445.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2445.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10664">CVE-2017-10664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823518" comment="qemu-img-1.5.3-141.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823519" comment="qemu-kvm-1.5.3-141.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823520" comment="qemu-kvm-common-1.5.3-141.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823521" comment="qemu-kvm-tools-1.5.3-141.el7_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:495" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="CVE-2017-7809" ref_url="https://www.suse.com/security/cve/CVE-2017-7809/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2456.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2456.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7753">CVE-2017-7753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7779">CVE-2017-7779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7784">CVE-2017-7784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7785">CVE-2017-7785 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7786">CVE-2017-7786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7787">CVE-2017-7787 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7791">CVE-2017-7791 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7792">CVE-2017-7792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7798">CVE-2017-7798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7800">CVE-2017-7800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7801">CVE-2017-7801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7802">CVE-2017-7802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7803">CVE-2017-7803 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7807">CVE-2017-7807 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7809/">CVE-2017-7809 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7809">CVE-2017-7809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823522" comment="firefox-52.3.0-2.el7_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:496" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2459.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2459.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2885">CVE-2017-2885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823523" comment="libsoup-2.56.0-4.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823524" comment="libsoup-devel-2.56.0-4.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:497" version="1" class="patch">
	<metadata>
		<title>security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7506" ref_url="https://www.suse.com/security/cve/CVE-2017-7506/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2471.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2471.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7506/">CVE-2017-7506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7506">CVE-2017-7506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823525" comment="spice-server-0.12.8-2.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823526" comment="spice-server-devel-0.12.8-2.el7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:498" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2473.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2473.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7533">CVE-2017-7533 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823527" comment="kernel-3.10.0-693.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823528" comment="kernel-abi-whitelists-3.10.0-693.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823529" comment="kernel-debug-3.10.0-693.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823532" comment="kernel-doc-3.10.0-693.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823533" comment="kernel-headers-3.10.0-693.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823534" comment="kernel-tools-3.10.0-693.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823535" comment="kernel-tools-libs-3.10.0-693.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823537" comment="perf-3.10.0-693.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823538" comment="python-perf-3.10.0-693.1.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:499" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-3167" ref_url="https://www.suse.com/security/cve/CVE-2017-3167/" source="CVE"/>
		<reference ref_id="CVE-2017-3169" ref_url="https://www.suse.com/security/cve/CVE-2017-3169/" source="CVE"/>
		<reference ref_id="CVE-2017-7668" ref_url="https://www.suse.com/security/cve/CVE-2017-7668/" source="CVE"/>
		<reference ref_id="CVE-2017-7679" ref_url="https://www.suse.com/security/cve/CVE-2017-7679/" source="CVE"/>
		<reference ref_id="CVE-2017-9788" ref_url="https://www.suse.com/security/cve/CVE-2017-9788/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2479.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2479.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3167/">CVE-2017-3167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3167">CVE-2017-3167 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3169/">CVE-2017-3169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3169">CVE-2017-3169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7668/">CVE-2017-7668 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7668">CVE-2017-7668 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7679/">CVE-2017-7679 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7679">CVE-2017-7679 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9788/">CVE-2017-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9788">CVE-2017-9788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823539" comment="httpd-2.4.6-67.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823540" comment="httpd-devel-2.4.6-67.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823541" comment="httpd-manual-2.4.6-67.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823542" comment="httpd-tools-2.4.6-67.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823543" comment="mod_ldap-2.4.6-67.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823544" comment="mod_proxy_html-2.4.6-67.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823545" comment="mod_session-2.4.6-67.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823546" comment="mod_ssl-2.4.6-67.el7_4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:500" version="1" class="patch">
	<metadata>
		<title>security update for subversion (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-9800" ref_url="https://www.suse.com/security/cve/CVE-2017-9800/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2480.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2480.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9800/">CVE-2017-9800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9800">CVE-2017-9800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823547" comment="mod_dav_svn-1.7.14-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823548" comment="subversion-1.7.14-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823549" comment="subversion-devel-1.7.14-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823550" comment="subversion-gnome-1.7.14-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823551" comment="subversion-javahl-1.7.14-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823552" comment="subversion-kde-1.7.14-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823553" comment="subversion-libs-1.7.14-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823554" comment="subversion-perl-1.7.14-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823555" comment="subversion-python-1.7.14-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823556" comment="subversion-ruby-1.7.14-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823557" comment="subversion-tools-1.7.14-11.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:501" version="1" class="patch">
	<metadata>
		<title>security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-1000117" ref_url="https://www.suse.com/security/cve/CVE-2017-1000117/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2484.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2484.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000117/">CVE-2017-1000117 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000117">CVE-2017-1000117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823558" comment="emacs-git-1.8.3.1-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823559" comment="emacs-git-el-1.8.3.1-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823560" comment="git-1.8.3.1-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823561" comment="git-all-1.8.3.1-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823562" comment="git-bzr-1.8.3.1-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823563" comment="git-cvs-1.8.3.1-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823564" comment="git-daemon-1.8.3.1-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823565" comment="git-email-1.8.3.1-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823566" comment="git-gui-1.8.3.1-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823567" comment="git-hg-1.8.3.1-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823568" comment="git-p4-1.8.3.1-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823569" comment="git-svn-1.8.3.1-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823570" comment="gitk-1.8.3.1-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823571" comment="gitweb-1.8.3.1-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823572" comment="perl-Git-1.8.3.1-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823573" comment="perl-Git-SVN-1.8.3.1-12.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:502" version="1" class="patch">
	<metadata>
		<title>security update for groovy (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-6814" ref_url="https://www.suse.com/security/cve/CVE-2016-6814/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2486.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2486.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6814/">CVE-2016-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6814">CVE-2016-6814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823574" comment="groovy-1.8.9-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823575" comment="groovy-javadoc-1.8.9-8.el7_4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823574" comment="groovy-1.8.9-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823575" comment="groovy-javadoc-1.8.9-8.el7_4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:503" version="1" class="patch">
	<metadata>
		<title>security update for mercurial (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-1000115" ref_url="https://www.suse.com/security/cve/CVE-2017-1000115/" source="CVE"/>
		<reference ref_id="CVE-2017-1000116" ref_url="https://www.suse.com/security/cve/CVE-2017-1000116/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2489.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2489.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000115/">CVE-2017-1000115 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000115">CVE-2017-1000115 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000116/">CVE-2017-1000116 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000116">CVE-2017-1000116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823576" comment="emacs-mercurial-2.6.2-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823577" comment="emacs-mercurial-el-2.6.2-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823578" comment="mercurial-2.6.2-8.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823579" comment="mercurial-hgk-2.6.2-8.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:504" version="1" class="patch">
	<metadata>
		<title>security update for xmlsec1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-1000061" ref_url="https://www.suse.com/security/cve/CVE-2017-1000061/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2492.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2492.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000061/">CVE-2017-1000061 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000061">CVE-2017-1000061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823580" comment="xmlsec1-1.2.20-7.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823581" comment="xmlsec1-devel-1.2.20-7.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823582" comment="xmlsec1-gcrypt-1.2.20-7.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823583" comment="xmlsec1-gcrypt-devel-1.2.20-7.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823584" comment="xmlsec1-gnutls-1.2.20-7.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823585" comment="xmlsec1-gnutls-devel-1.2.20-7.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823586" comment="xmlsec1-nss-1.2.20-7.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823587" comment="xmlsec1-nss-devel-1.2.20-7.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823588" comment="xmlsec1-openssl-1.2.20-7.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823589" comment="xmlsec1-openssl-devel-1.2.20-7.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:505" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="CVE-2017-7809" ref_url="https://www.suse.com/security/cve/CVE-2017-7809/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2534.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2534.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7753">CVE-2017-7753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7779">CVE-2017-7779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7784">CVE-2017-7784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7785">CVE-2017-7785 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7786">CVE-2017-7786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7787">CVE-2017-7787 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7791">CVE-2017-7791 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7792">CVE-2017-7792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7800">CVE-2017-7800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7801">CVE-2017-7801 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7802">CVE-2017-7802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7803">CVE-2017-7803 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7807">CVE-2017-7807 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7809/">CVE-2017-7809 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7809">CVE-2017-7809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823590" comment="thunderbird-52.3.0-1.el7_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:506" version="1" class="patch">
	<metadata>
		<title>security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-9775" ref_url="https://www.suse.com/security/cve/CVE-2017-9775/" source="CVE"/>
		<reference ref_id="CVE-2017-9776" ref_url="https://www.suse.com/security/cve/CVE-2017-9776/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2551.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2551.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9775/">CVE-2017-9775 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9775">CVE-2017-9775 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9776/">CVE-2017-9776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9776">CVE-2017-9776 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823591" comment="poppler-0.26.5-17.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823592" comment="poppler-cpp-0.26.5-17.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823593" comment="poppler-cpp-devel-0.26.5-17.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823594" comment="poppler-demos-0.26.5-17.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823595" comment="poppler-devel-0.26.5-17.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823596" comment="poppler-glib-0.26.5-17.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823597" comment="poppler-glib-devel-0.26.5-17.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823598" comment="poppler-qt-0.26.5-17.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823599" comment="poppler-qt-devel-0.26.5-17.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823600" comment="poppler-utils-0.26.5-17.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:507" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2679.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2679.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000251">CVE-2017-1000251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823601" comment="kernel-3.10.0-693.2.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823602" comment="kernel-abi-whitelists-3.10.0-693.2.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823603" comment="kernel-debug-3.10.0-693.2.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823606" comment="kernel-doc-3.10.0-693.2.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823607" comment="kernel-headers-3.10.0-693.2.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823608" comment="kernel-tools-3.10.0-693.2.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823609" comment="kernel-tools-libs-3.10.0-693.2.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823611" comment="perf-3.10.0-693.2.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823612" comment="python-perf-3.10.0-693.2.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:508" version="1" class="patch">
	<metadata>
		<title>security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-1000250" ref_url="https://www.suse.com/security/cve/CVE-2017-1000250/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2685.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2685.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000250/">CVE-2017-1000250 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000250">CVE-2017-1000250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823613" comment="bluez-5.44-4.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823614" comment="bluez-cups-5.44-4.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823615" comment="bluez-hid2hci-5.44-4.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823616" comment="bluez-libs-5.44-4.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823617" comment="bluez-libs-devel-5.44-4.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:509" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546/" source="CVE"/>
		<reference ref_id="CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2728.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2728.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7546">CVE-2017-7546 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7547">CVE-2017-7547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823618" comment="postgresql-9.2.23-1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823619" comment="postgresql-contrib-9.2.23-1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823620" comment="postgresql-devel-9.2.23-1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823621" comment="postgresql-docs-9.2.23-1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823622" comment="postgresql-libs-9.2.23-1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823623" comment="postgresql-plperl-9.2.23-1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823624" comment="postgresql-plpython-9.2.23-1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823625" comment="postgresql-pltcl-9.2.23-1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823626" comment="postgresql-server-9.2.23-1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823627" comment="postgresql-static-9.2.23-1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823628" comment="postgresql-test-9.2.23-1.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823629" comment="postgresql-upgrade-9.2.23-1.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:510" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2771.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2771.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14482">CVE-2017-14482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823630" comment="emacs-24.3-20.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823631" comment="emacs-common-24.3-20.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823632" comment="emacs-el-24.3-20.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823633" comment="emacs-filesystem-24.3-20.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823634" comment="emacs-nox-24.3-20.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823635" comment="emacs-terminal-24.3-20.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:511" version="1" class="patch">
	<metadata>
		<title>security update for augeas (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2788.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2788.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7555">CVE-2017-7555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823636" comment="augeas-1.4.0-2.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823637" comment="augeas-devel-1.4.0-2.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823638" comment="augeas-libs-1.4.0-2.el7_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:512" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2790.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2790.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12150">CVE-2017-12150 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12151">CVE-2017-12151 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12163">CVE-2017-12163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823639" comment="ctdb-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823640" comment="ctdb-tests-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823641" comment="libsmbclient-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823642" comment="libsmbclient-devel-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823643" comment="libwbclient-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823644" comment="libwbclient-devel-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823645" comment="samba-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823646" comment="samba-client-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823647" comment="samba-client-libs-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823648" comment="samba-common-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823649" comment="samba-common-libs-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823650" comment="samba-common-tools-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823651" comment="samba-dc-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823652" comment="samba-dc-libs-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823653" comment="samba-devel-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823654" comment="samba-krb5-printing-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823655" comment="samba-libs-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823656" comment="samba-pidl-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823657" comment="samba-python-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823658" comment="samba-test-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823659" comment="samba-test-libs-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823660" comment="samba-vfs-glusterfs-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823661" comment="samba-winbind-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823662" comment="samba-winbind-clients-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823663" comment="samba-winbind-krb5-locator-4.6.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823664" comment="samba-winbind-modules-4.6.2-11.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:513" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2831.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2831.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7793">CVE-2017-7793 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7810">CVE-2017-7810 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7814">CVE-2017-7814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7818">CVE-2017-7818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7819">CVE-2017-7819 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7823">CVE-2017-7823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7824">CVE-2017-7824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823665" comment="firefox-52.4.0-1.el7_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:514" version="1" class="patch">
	<metadata>
		<title>security update for nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2832.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2832.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7805">CVE-2017-7805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823666" comment="nss-3.28.4-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823667" comment="nss-devel-3.28.4-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823668" comment="nss-pkcs11-devel-3.28.4-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823669" comment="nss-sysinit-3.28.4-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823670" comment="nss-tools-3.28.4-12.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:515" version="1" class="patch">
	<metadata>
		<title>security update for dnsmasq (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2836.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2836.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14491">CVE-2017-14491 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14492">CVE-2017-14492 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14493">CVE-2017-14493 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14494">CVE-2017-14494 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14495">CVE-2017-14495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14496">CVE-2017-14496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823671" comment="dnsmasq-2.76-2.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823672" comment="dnsmasq-utils-2.76-2.el7_4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:516" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2882.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2882.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9798">CVE-2017-9798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823673" comment="httpd-2.4.6-67.el7_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823674" comment="httpd-devel-2.4.6-67.el7_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823675" comment="httpd-manual-2.4.6-67.el7_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823676" comment="httpd-tools-2.4.6-67.el7_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823677" comment="mod_ldap-2.4.6-67.el7_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823678" comment="mod_proxy_html-2.4.6-67.el7_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823679" comment="mod_session-2.4.6-67.el7_4.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823680" comment="mod_ssl-2.4.6-67.el7_4.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:517" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2885.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2885.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7793">CVE-2017-7793 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7810">CVE-2017-7810 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7814">CVE-2017-7814 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7818">CVE-2017-7818 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7819">CVE-2017-7819 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7823">CVE-2017-7823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7824">CVE-2017-7824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823681" comment="thunderbird-52.4.0-2.el7_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:518" version="1" class="patch">
	<metadata>
		<title>security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077/" source="CVE"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082/" source="CVE"/>
		<reference ref_id="CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2907.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2907.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13077">CVE-2017-13077 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13082">CVE-2017-13082 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13086">CVE-2017-13086 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13087">CVE-2017-13087 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13088">CVE-2017-13088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823682" comment="wpa_supplicant-2.6-5.el7_4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:519" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-8399" ref_url="https://www.suse.com/security/cve/CVE-2016-8399/" source="CVE"/>
		<reference ref_id="CVE-2017-1000111" ref_url="https://www.suse.com/security/cve/CVE-2017-1000111/" source="CVE"/>
		<reference ref_id="CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112/" source="CVE"/>
		<reference ref_id="CVE-2017-11176" ref_url="https://www.suse.com/security/cve/CVE-2017-11176/" source="CVE"/>
		<reference ref_id="CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106/" source="CVE"/>
		<reference ref_id="CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184/" source="CVE"/>
		<reference ref_id="CVE-2017-7541" ref_url="https://www.suse.com/security/cve/CVE-2017-7541/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-7558" ref_url="https://www.suse.com/security/cve/CVE-2017-7558/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2930.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2930.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8399/">CVE-2016-8399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8399">CVE-2016-8399 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000111/">CVE-2017-1000111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000111">CVE-2017-1000111 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000112">CVE-2017-1000112 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11176/">CVE-2017-11176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11176">CVE-2017-11176 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14106">CVE-2017-14106 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7184">CVE-2017-7184 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7541/">CVE-2017-7541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7541">CVE-2017-7541 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7542">CVE-2017-7542 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7558/">CVE-2017-7558 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7558">CVE-2017-7558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823683" comment="kernel-3.10.0-693.5.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823684" comment="kernel-abi-whitelists-3.10.0-693.5.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823685" comment="kernel-debug-3.10.0-693.5.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823688" comment="kernel-doc-3.10.0-693.5.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823689" comment="kernel-headers-3.10.0-693.5.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823690" comment="kernel-tools-3.10.0-693.5.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823691" comment="kernel-tools-libs-3.10.0-693.5.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823693" comment="perf-3.10.0-693.5.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823694" comment="python-perf-3.10.0-693.5.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:520" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:2998.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:2998.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10274">CVE-2017-10274 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10281">CVE-2017-10281 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10285">CVE-2017-10285 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10295">CVE-2017-10295 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10345">CVE-2017-10345 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10346">CVE-2017-10346 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10347">CVE-2017-10347 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10348">CVE-2017-10348 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10349">CVE-2017-10349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10350">CVE-2017-10350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10355">CVE-2017-10355 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10356">CVE-2017-10356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10357">CVE-2017-10357 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10388">CVE-2017-10388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823695" comment="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823696" comment="java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823697" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823698" comment="java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823699" comment="java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823700" comment="java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823701" comment="java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823702" comment="java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823703" comment="java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823704" comment="java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823705" comment="java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823706" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823707" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823708" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823709" comment="java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823710" comment="java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:521" version="1" class="patch">
	<metadata>
		<title>security update for wget (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-13089" ref_url="https://www.suse.com/security/cve/CVE-2017-13089/" source="CVE"/>
		<reference ref_id="CVE-2017-13090" ref_url="https://www.suse.com/security/cve/CVE-2017-13090/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3075.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3075.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13089/">CVE-2017-13089 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13089">CVE-2017-13089 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13090/">CVE-2017-13090 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13090">CVE-2017-13090 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823711" comment="wget-1.14-15.el7_4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:522" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-12615" ref_url="https://www.suse.com/security/cve/CVE-2017-12615/" source="CVE"/>
		<reference ref_id="CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617/" source="CVE"/>
		<reference ref_id="CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647/" source="CVE"/>
		<reference ref_id="CVE-2017-7674" ref_url="https://www.suse.com/security/cve/CVE-2017-7674/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3081.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3081.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12615/">CVE-2017-12615 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12615">CVE-2017-12615 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12617">CVE-2017-12617 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5647">CVE-2017-5647 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7674/">CVE-2017-7674 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7674">CVE-2017-7674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823712" comment="tomcat-7.0.76-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823713" comment="tomcat-admin-webapps-7.0.76-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823714" comment="tomcat-docs-webapp-7.0.76-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823715" comment="tomcat-el-2.2-api-7.0.76-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823716" comment="tomcat-javadoc-7.0.76-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823717" comment="tomcat-jsp-2.2-api-7.0.76-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823718" comment="tomcat-jsvc-7.0.76-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823719" comment="tomcat-lib-7.0.76-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823720" comment="tomcat-servlet-3.0-api-7.0.76-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823721" comment="tomcat-webapps-7.0.76-3.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:523" version="1" class="patch">
	<metadata>
		<title>security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-8184" ref_url="https://www.suse.com/security/cve/CVE-2014-8184/" source="CVE"/>
		<reference ref_id="CVE-2017-13738" ref_url="https://www.suse.com/security/cve/CVE-2017-13738/" source="CVE"/>
		<reference ref_id="CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13742" ref_url="https://www.suse.com/security/cve/CVE-2017-13742/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<reference ref_id="CVE-2017-13744" ref_url="https://www.suse.com/security/cve/CVE-2017-13744/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3111.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3111.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-8184/">CVE-2014-8184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8184">CVE-2014-8184 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13738/">CVE-2017-13738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13738">CVE-2017-13738 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13740">CVE-2017-13740 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13741">CVE-2017-13741 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13742/">CVE-2017-13742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13742">CVE-2017-13742 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13743">CVE-2017-13743 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13744/">CVE-2017-13744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13744">CVE-2017-13744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823722" comment="liblouis-2.5.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823723" comment="liblouis-devel-2.5.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823724" comment="liblouis-doc-2.5.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823725" comment="liblouis-python-2.5.2-11.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823726" comment="liblouis-utils-2.5.2-11.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:524" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3221.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3221.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10167">CVE-2016-10167 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10168">CVE-2016-10168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823727" comment="php-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823728" comment="php-bcmath-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823729" comment="php-cli-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823730" comment="php-common-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823731" comment="php-dba-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823732" comment="php-devel-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823733" comment="php-embedded-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823734" comment="php-enchant-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823735" comment="php-fpm-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823736" comment="php-gd-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823737" comment="php-intl-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823738" comment="php-ldap-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823739" comment="php-mbstring-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823740" comment="php-mysql-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823741" comment="php-mysqlnd-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823742" comment="php-odbc-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823743" comment="php-pdo-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823744" comment="php-pgsql-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823745" comment="php-process-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823746" comment="php-pspell-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823747" comment="php-recode-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823748" comment="php-snmp-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823749" comment="php-soap-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823750" comment="php-xml-5.4.16-43.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823751" comment="php-xmlrpc-5.4.16-43.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:525" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3247.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3247.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7826">CVE-2017-7826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7828">CVE-2017-7828 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7830">CVE-2017-7830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823752" comment="firefox-52.5.0-1.el7_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:526" version="1" class="patch">
	<metadata>
		<title>security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746/" source="CVE"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3260.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3260.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14746">CVE-2017-14746 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15275">CVE-2017-15275 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823753" comment="ctdb-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823754" comment="ctdb-tests-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823755" comment="libsmbclient-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823756" comment="libsmbclient-devel-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823757" comment="libwbclient-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823758" comment="libwbclient-devel-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823759" comment="samba-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823760" comment="samba-client-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823761" comment="samba-client-libs-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823762" comment="samba-common-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823763" comment="samba-common-libs-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823764" comment="samba-common-tools-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823765" comment="samba-dc-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823766" comment="samba-dc-libs-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823767" comment="samba-devel-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823768" comment="samba-krb5-printing-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823769" comment="samba-libs-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823770" comment="samba-pidl-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823771" comment="samba-python-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823772" comment="samba-test-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823773" comment="samba-test-libs-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823774" comment="samba-vfs-glusterfs-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823775" comment="samba-winbind-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823776" comment="samba-winbind-clients-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823777" comment="samba-winbind-krb5-locator-4.6.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823778" comment="samba-winbind-modules-4.6.2-12.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:527" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-1000257" ref_url="https://www.suse.com/security/cve/CVE-2017-1000257/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3263.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3263.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000257/">CVE-2017-1000257 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000257">CVE-2017-1000257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823779" comment="curl-7.29.0-42.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823780" comment="libcurl-7.29.0-42.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823781" comment="libcurl-devel-7.29.0-42.el7_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:528" version="1" class="patch">
	<metadata>
		<title>security update for procmail (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3269.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3269.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16844">CVE-2017-16844 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823782" comment="procmail-3.22-36.el7_4.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823782" comment="procmail-3.22-36.el7_4.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:529" version="1" class="patch">
	<metadata>
		<title>security update for apr (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-12613" ref_url="https://www.suse.com/security/cve/CVE-2017-12613/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3270.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3270.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12613/">CVE-2017-12613 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12613">CVE-2017-12613 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823783" comment="apr-1.4.8-3.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823784" comment="apr-devel-1.4.8-3.el7_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:530" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3315.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3315.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000380">CVE-2017-1000380 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823785" comment="kernel-3.10.0-693.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823786" comment="kernel-abi-whitelists-3.10.0-693.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823787" comment="kernel-debug-3.10.0-693.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823790" comment="kernel-doc-3.10.0-693.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823791" comment="kernel-headers-3.10.0-693.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823792" comment="kernel-tools-3.10.0-693.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823793" comment="kernel-tools-libs-3.10.0-693.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823795" comment="perf-3.10.0-693.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823796" comment="python-perf-3.10.0-693.11.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:531" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3368.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3368.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14167">CVE-2017-14167 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15289">CVE-2017-15289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823797" comment="qemu-img-1.5.3-141.el7_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823798" comment="qemu-kvm-1.5.3-141.el7_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823799" comment="qemu-kvm-common-1.5.3-141.el7_4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823800" comment="qemu-kvm-tools-1.5.3-141.el7_4.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:532" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3372.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3372.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7826">CVE-2017-7826 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7828">CVE-2017-7828 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7830">CVE-2017-7830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823801" comment="thunderbird-52.5.0-1.el7_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:533" version="1" class="patch">
	<metadata>
		<title>security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-12173" ref_url="https://www.suse.com/security/cve/CVE-2017-12173/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3379.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3379.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12173/">CVE-2017-12173 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12173">CVE-2017-12173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823802" comment="libipa_hbac-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823803" comment="libipa_hbac-devel-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823804" comment="libsss_autofs-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823805" comment="libsss_certmap-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823806" comment="libsss_certmap-devel-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823807" comment="libsss_idmap-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823808" comment="libsss_idmap-devel-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823809" comment="libsss_nss_idmap-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823810" comment="libsss_nss_idmap-devel-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823811" comment="libsss_simpleifp-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823812" comment="libsss_simpleifp-devel-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823813" comment="libsss_sudo-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823814" comment="python-libipa_hbac-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823815" comment="python-libsss_nss_idmap-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823816" comment="python-sss-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823817" comment="python-sss-murmur-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823818" comment="python-sssdconfig-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823819" comment="sssd-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823820" comment="sssd-ad-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823821" comment="sssd-client-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823822" comment="sssd-common-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823823" comment="sssd-common-pac-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823824" comment="sssd-dbus-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823825" comment="sssd-ipa-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823826" comment="sssd-kcm-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823827" comment="sssd-krb5-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823828" comment="sssd-krb5-common-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823829" comment="sssd-ldap-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823830" comment="sssd-libwbclient-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823831" comment="sssd-libwbclient-devel-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823832" comment="sssd-polkit-rules-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823833" comment="sssd-proxy-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823834" comment="sssd-tools-1.15.2-50.el7_4.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823835" comment="sssd-winbind-idmap-1.15.2-50.el7_4.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:534" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7843" ref_url="https://www.suse.com/security/cve/CVE-2017-7843/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3382.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3382.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7843/">CVE-2017-7843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7843">CVE-2017-7843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823836" comment="firefox-52.5.1-1.el7_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:535" version="1" class="patch">
	<metadata>
		<title>security update for liblouis (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-15101" ref_url="https://www.suse.com/security/cve/CVE-2017-15101/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3384.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3384.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15101/">CVE-2017-15101 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15101">CVE-2017-15101 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823837" comment="liblouis-2.5.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823838" comment="liblouis-devel-2.5.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823839" comment="liblouis-doc-2.5.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823840" comment="liblouis-python-2.5.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823841" comment="liblouis-utils-2.5.2-12.el7_4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823837" comment="liblouis-2.5.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823838" comment="liblouis-devel-2.5.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823839" comment="liblouis-doc-2.5.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823840" comment="liblouis-python-2.5.2-12.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823841" comment="liblouis-utils-2.5.2-12.el7_4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:536" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193/" source="CVE"/>
		<reference ref_id="CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198/" source="CVE"/>
		<reference ref_id="CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3392.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3392.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10193">CVE-2017-10193 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10198">CVE-2017-10198 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10274">CVE-2017-10274 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10281">CVE-2017-10281 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10285">CVE-2017-10285 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10295">CVE-2017-10295 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10345">CVE-2017-10345 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10346">CVE-2017-10346 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10347">CVE-2017-10347 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10348">CVE-2017-10348 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10349">CVE-2017-10349 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10350">CVE-2017-10350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10355">CVE-2017-10355 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10356">CVE-2017-10356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10357">CVE-2017-10357 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10388">CVE-2017-10388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823842" comment="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823843" comment="java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823844" comment="java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823845" comment="java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823846" comment="java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823847" comment="java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823848" comment="java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:537" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-12172" ref_url="https://www.suse.com/security/cve/CVE-2017-12172/" source="CVE"/>
		<reference ref_id="CVE-2017-15097" ref_url="https://www.suse.com/security/cve/CVE-2017-15097/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2017:3402.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2017:3402.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12172/">CVE-2017-12172 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12172">CVE-2017-12172 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15097/">CVE-2017-15097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15097">CVE-2017-15097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823849" comment="postgresql-9.2.23-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823850" comment="postgresql-contrib-9.2.23-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823851" comment="postgresql-devel-9.2.23-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823852" comment="postgresql-docs-9.2.23-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823853" comment="postgresql-libs-9.2.23-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823854" comment="postgresql-plperl-9.2.23-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823855" comment="postgresql-plpython-9.2.23-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823856" comment="postgresql-pltcl-9.2.23-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823857" comment="postgresql-server-9.2.23-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823858" comment="postgresql-static-9.2.23-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823859" comment="postgresql-test-9.2.23-3.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823860" comment="postgresql-upgrade-9.2.23-3.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:538" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0007.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0007.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823861" comment="kernel-3.10.0-693.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823862" comment="kernel-abi-whitelists-3.10.0-693.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823863" comment="kernel-debug-3.10.0-693.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823866" comment="kernel-doc-3.10.0-693.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823867" comment="kernel-headers-3.10.0-693.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823868" comment="kernel-tools-3.10.0-693.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823869" comment="kernel-tools-libs-3.10.0-693.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823871" comment="perf-3.10.0-693.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823872" comment="python-perf-3.10.0-693.11.6.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:539" version="1" class="patch">
	<metadata>
		<title>security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0012.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0012.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823873" comment="microcode_ctl-2.1-22.2.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:540" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0014.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0014.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823874" comment="iwl100-firmware-39.31.5.1-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823875" comment="iwl1000-firmware-39.31.5.1-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823876" comment="iwl105-firmware-18.168.6.1-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823877" comment="iwl135-firmware-18.168.6.1-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823878" comment="iwl2000-firmware-18.168.6.1-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823879" comment="iwl2030-firmware-18.168.6.1-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823880" comment="iwl3160-firmware-22.0.7.0-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823881" comment="iwl3945-firmware-15.32.2.9-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823882" comment="iwl4965-firmware-228.61.2.24-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823883" comment="iwl5000-firmware-8.83.5.1_1-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823884" comment="iwl5150-firmware-8.24.2.2-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823885" comment="iwl6000-firmware-9.221.4.1-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823886" comment="iwl6000g2a-firmware-17.168.5.3-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823887" comment="iwl6000g2b-firmware-17.168.5.2-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823888" comment="iwl6050-firmware-41.28.5.1-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823889" comment="iwl7260-firmware-22.0.7.0-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823890" comment="iwl7265-firmware-22.0.7.0-57.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823891" comment="linux-firmware-20170606-57.gitc990aae.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:541" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0023.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0023.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823892" comment="qemu-img-1.5.3-141.el7_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823893" comment="qemu-kvm-1.5.3-141.el7_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823894" comment="qemu-kvm-common-1.5.3-141.el7_4.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823895" comment="qemu-kvm-tools-1.5.3-141.el7_4.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:542" version="1" class="patch">
	<metadata>
		<title>security update for libvirt-admin (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0029.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0029.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823896" comment="libvirt-admin-3.2.0-14.el7_4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823897" comment="libvirt-daemon-lxc-3.2.0-14.el7_4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823898" comment="libvirt-lock-sanlock-3.2.0-14.el7_4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823899" comment="libvirt-login-shell-3.2.0-14.el7_4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823900" comment="libvirt-nss-3.2.0-14.el7_4.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:543" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7829" ref_url="https://www.suse.com/security/cve/CVE-2017-7829/" source="CVE"/>
		<reference ref_id="CVE-2017-7846" ref_url="https://www.suse.com/security/cve/CVE-2017-7846/" source="CVE"/>
		<reference ref_id="CVE-2017-7847" ref_url="https://www.suse.com/security/cve/CVE-2017-7847/" source="CVE"/>
		<reference ref_id="CVE-2017-7848" ref_url="https://www.suse.com/security/cve/CVE-2017-7848/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0061.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0061.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7829/">CVE-2017-7829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7829">CVE-2017-7829 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7846/">CVE-2017-7846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7846">CVE-2017-7846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7847/">CVE-2017-7847 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7847">CVE-2017-7847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7848/">CVE-2017-7848 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7848">CVE-2017-7848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823901" comment="thunderbird-52.5.2-1.el7_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:544" version="1" class="patch">
	<metadata>
		<title>security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0093.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0093.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823902" comment="microcode_ctl-2.1-22.5.el7_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:545" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0094.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0094.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823903" comment="iwl100-firmware-39.31.5.1-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823904" comment="iwl1000-firmware-39.31.5.1-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823905" comment="iwl105-firmware-18.168.6.1-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823906" comment="iwl135-firmware-18.168.6.1-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823907" comment="iwl2000-firmware-18.168.6.1-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823908" comment="iwl2030-firmware-18.168.6.1-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823909" comment="iwl3160-firmware-22.0.7.0-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823910" comment="iwl3945-firmware-15.32.2.9-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823911" comment="iwl4965-firmware-228.61.2.24-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823912" comment="iwl5000-firmware-8.83.5.1_1-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823913" comment="iwl5150-firmware-8.24.2.2-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823914" comment="iwl6000-firmware-9.221.4.1-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823915" comment="iwl6000g2a-firmware-17.168.5.3-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823916" comment="iwl6000g2b-firmware-17.168.5.2-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823917" comment="iwl6050-firmware-41.28.5.1-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823918" comment="iwl7260-firmware-22.0.7.0-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823919" comment="iwl7265-firmware-22.0.7.0-58.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823920" comment="linux-firmware-20170606-58.gitc990aae.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:546" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0095.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0095.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2579">CVE-2018-2579 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2582">CVE-2018-2582 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2588">CVE-2018-2588 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2599">CVE-2018-2599 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2602">CVE-2018-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2603">CVE-2018-2603 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2618">CVE-2018-2618 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2629">CVE-2018-2629 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2633">CVE-2018-2633 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2634">CVE-2018-2634 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2637">CVE-2018-2637 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2641">CVE-2018-2641 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2663">CVE-2018-2663 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2677">CVE-2018-2677 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2678">CVE-2018-2678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823921" comment="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823922" comment="java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823923" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823924" comment="java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823925" comment="java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823926" comment="java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823927" comment="java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823928" comment="java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823929" comment="java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823930" comment="java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823931" comment="java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823932" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823933" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823934" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823935" comment="java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823936" comment="java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:547" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0102.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0102.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3145">CVE-2017-3145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823937" comment="bind-9.9.4-51.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823938" comment="bind-chroot-9.9.4-51.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823939" comment="bind-devel-9.9.4-51.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823940" comment="bind-libs-9.9.4-51.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823941" comment="bind-libs-lite-9.9.4-51.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823942" comment="bind-license-9.9.4-51.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823943" comment="bind-lite-devel-9.9.4-51.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823944" comment="bind-pkcs11-9.9.4-51.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823945" comment="bind-pkcs11-devel-9.9.4-51.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823946" comment="bind-pkcs11-libs-9.9.4-51.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823947" comment="bind-pkcs11-utils-9.9.4-51.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823948" comment="bind-sdb-9.9.4-51.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823949" comment="bind-sdb-chroot-9.9.4-51.el7_4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823950" comment="bind-utils-9.9.4-51.el7_4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:548" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0122.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0122.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5089">CVE-2018-5089 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5091">CVE-2018-5091 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5095">CVE-2018-5095 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5096">CVE-2018-5096 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5097">CVE-2018-5097 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5098">CVE-2018-5098 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5099">CVE-2018-5099 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5102">CVE-2018-5102 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5103">CVE-2018-5103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5104">CVE-2018-5104 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5117">CVE-2018-5117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823951" comment="firefox-52.6.0-1.el7_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:549" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2017-12192" ref_url="https://www.suse.com/security/cve/CVE-2017-12192/" source="CVE"/>
		<reference ref_id="CVE-2017-12193" ref_url="https://www.suse.com/security/cve/CVE-2017-12193/" source="CVE"/>
		<reference ref_id="CVE-2017-15649" ref_url="https://www.suse.com/security/cve/CVE-2017-15649/" source="CVE"/>
		<reference ref_id="CVE-2017-7472" ref_url="https://www.suse.com/security/cve/CVE-2017-7472/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0151.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0151.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8539">CVE-2015-8539 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12192/">CVE-2017-12192 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12192">CVE-2017-12192 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12193/">CVE-2017-12193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12193">CVE-2017-12193 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15649/">CVE-2017-15649 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15649">CVE-2017-15649 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7472/">CVE-2017-7472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7472">CVE-2017-7472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823952" comment="kernel-3.10.0-693.17.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823953" comment="kernel-abi-whitelists-3.10.0-693.17.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823954" comment="kernel-debug-3.10.0-693.17.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823957" comment="kernel-doc-3.10.0-693.17.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823958" comment="kernel-headers-3.10.0-693.17.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823959" comment="kernel-tools-3.10.0-693.17.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823960" comment="kernel-tools-libs-3.10.0-693.17.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823962" comment="perf-3.10.0-693.17.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823963" comment="python-perf-3.10.0-693.17.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:550" version="1" class="patch">
	<metadata>
		<title>security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0158.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0158.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3144">CVE-2017-3144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823964" comment="dhclient-4.2.5-58.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823965" comment="dhcp-4.2.5-58.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823966" comment="dhcp-common-4.2.5-58.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823967" comment="dhcp-devel-4.2.5-58.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823968" comment="dhcp-libs-4.2.5-58.el7_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:551" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-15134" ref_url="https://www.suse.com/security/cve/CVE-2017-15134/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0163.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0163.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15134/">CVE-2017-15134 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15134">CVE-2017-15134 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823969" comment="389-ds-base-1.3.6.1-26.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823970" comment="389-ds-base-devel-1.3.6.1-26.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823971" comment="389-ds-base-libs-1.3.6.1-26.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823972" comment="389-ds-base-snmp-1.3.6.1-26.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:552" version="1" class="patch">
	<metadata>
		<title>security update for nautilus (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-14604" ref_url="https://www.suse.com/security/cve/CVE-2017-14604/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0223.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0223.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14604/">CVE-2017-14604 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14604">CVE-2017-14604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823973" comment="nautilus-3.22.3-4.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823974" comment="nautilus-devel-3.22.3-4.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823975" comment="nautilus-extensions-3.22.3-4.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:553" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1049" ref_url="https://www.suse.com/security/cve/CVE-2018-1049/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0260.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0260.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1049/">CVE-2018-1049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1049">CVE-2018-1049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823976" comment="libgudev1-219-42.el7_4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823977" comment="libgudev1-devel-219-42.el7_4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823978" comment="systemd-219-42.el7_4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823979" comment="systemd-devel-219-42.el7_4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823980" comment="systemd-journal-gateway-219-42.el7_4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823981" comment="systemd-libs-219-42.el7_4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823982" comment="systemd-networkd-219-42.el7_4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823983" comment="systemd-python-219-42.el7_4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823984" comment="systemd-resolved-219-42.el7_4.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823985" comment="systemd-sysv-219-42.el7_4.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:554" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0262.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0262.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5089">CVE-2018-5089 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5095">CVE-2018-5095 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5096">CVE-2018-5096 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5097">CVE-2018-5097 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5098">CVE-2018-5098 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5099">CVE-2018-5099 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5102">CVE-2018-5102 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5103">CVE-2018-5103 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5104">CVE-2018-5104 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5117">CVE-2018-5117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823986" comment="thunderbird-52.6.0-1.el7_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:555" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0349.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0349.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2579">CVE-2018-2579 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2588">CVE-2018-2588 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2599">CVE-2018-2599 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2602">CVE-2018-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2603">CVE-2018-2603 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2618">CVE-2018-2618 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2629">CVE-2018-2629 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2633">CVE-2018-2633 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2634">CVE-2018-2634 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2637">CVE-2018-2637 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2641">CVE-2018-2641 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2663">CVE-2018-2663 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2677">CVE-2018-2677 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2678">CVE-2018-2678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823987" comment="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823988" comment="java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823989" comment="java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823990" comment="java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823991" comment="java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823992" comment="java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823993" comment="java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:556" version="1" class="patch">
	<metadata>
		<title>security update for gcab (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-5345" ref_url="https://www.suse.com/security/cve/CVE-2018-5345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0350.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0350.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5345/">CVE-2018-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5345">CVE-2018-5345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823994" comment="gcab-0.7-4.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823995" comment="libgcab1-0.7-4.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823996" comment="libgcab1-devel-0.7-4.el7_4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823994" comment="gcab-0.7-4.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823995" comment="libgcab1-0.7-4.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823996" comment="libgcab1-devel-0.7-4.el7_4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:557" version="1" class="patch">
	<metadata>
		<title>security update for quagga (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-5379" ref_url="https://www.suse.com/security/cve/CVE-2018-5379/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0377.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0377.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5379/">CVE-2018-5379 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5379">CVE-2018-5379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823997" comment="quagga-0.99.22.4-5.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823998" comment="quagga-contrib-0.99.22.4-5.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823999" comment="quagga-devel-0.99.22.4-5.el7_4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009823997" comment="quagga-0.99.22.4-5.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823998" comment="quagga-contrib-0.99.22.4-5.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009823999" comment="quagga-devel-0.99.22.4-5.el7_4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:558" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-0898" ref_url="https://www.suse.com/security/cve/CVE-2017-0898/" source="CVE"/>
		<reference ref_id="CVE-2017-0899" ref_url="https://www.suse.com/security/cve/CVE-2017-0899/" source="CVE"/>
		<reference ref_id="CVE-2017-0900" ref_url="https://www.suse.com/security/cve/CVE-2017-0900/" source="CVE"/>
		<reference ref_id="CVE-2017-0901" ref_url="https://www.suse.com/security/cve/CVE-2017-0901/" source="CVE"/>
		<reference ref_id="CVE-2017-0902" ref_url="https://www.suse.com/security/cve/CVE-2017-0902/" source="CVE"/>
		<reference ref_id="CVE-2017-0903" ref_url="https://www.suse.com/security/cve/CVE-2017-0903/" source="CVE"/>
		<reference ref_id="CVE-2017-10784" ref_url="https://www.suse.com/security/cve/CVE-2017-10784/" source="CVE"/>
		<reference ref_id="CVE-2017-14033" ref_url="https://www.suse.com/security/cve/CVE-2017-14033/" source="CVE"/>
		<reference ref_id="CVE-2017-14064" ref_url="https://www.suse.com/security/cve/CVE-2017-14064/" source="CVE"/>
		<reference ref_id="CVE-2017-17405" ref_url="https://www.suse.com/security/cve/CVE-2017-17405/" source="CVE"/>
		<reference ref_id="CVE-2017-17790" ref_url="https://www.suse.com/security/cve/CVE-2017-17790/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0378.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0378.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0898/">CVE-2017-0898 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0898">CVE-2017-0898 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-0899/">CVE-2017-0899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0899">CVE-2017-0899 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0900/">CVE-2017-0900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0900">CVE-2017-0900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-0901/">CVE-2017-0901 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0901">CVE-2017-0901 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0902/">CVE-2017-0902 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0902">CVE-2017-0902 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0903/">CVE-2017-0903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0903">CVE-2017-0903 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10784/">CVE-2017-10784 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10784">CVE-2017-10784 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14033/">CVE-2017-14033 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14033">CVE-2017-14033 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14064/">CVE-2017-14064 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14064">CVE-2017-14064 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17405/">CVE-2017-17405 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17405">CVE-2017-17405 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17790/">CVE-2017-17790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17790">CVE-2017-17790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824000" comment="ruby-2.0.0.648-33.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824001" comment="ruby-devel-2.0.0.648-33.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824002" comment="ruby-doc-2.0.0.648-33.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824003" comment="ruby-irb-2.0.0.648-33.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824004" comment="ruby-libs-2.0.0.648-33.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824005" comment="ruby-tcltk-2.0.0.648-33.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824006" comment="rubygem-bigdecimal-1.2.0-33.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824007" comment="rubygem-io-console-0.4.2-33.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824008" comment="rubygem-json-1.7.7-33.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824009" comment="rubygem-minitest-4.3.2-33.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824010" comment="rubygem-psych-2.0.0-33.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824011" comment="rubygem-rake-0.9.6-33.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824012" comment="rubygem-rdoc-4.0.0-33.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824013" comment="rubygems-2.0.14.1-33.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824014" comment="rubygems-devel-2.0.14.1-33.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:559" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-12188" ref_url="https://www.suse.com/security/cve/CVE-2017-12188/" source="CVE"/>
		<reference ref_id="CVE-2017-7518" ref_url="https://www.suse.com/security/cve/CVE-2017-7518/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0395.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0395.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12188/">CVE-2017-12188 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12188">CVE-2017-12188 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7518/">CVE-2017-7518 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7518">CVE-2017-7518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824015" comment="kernel-3.10.0-693.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824016" comment="kernel-abi-whitelists-3.10.0-693.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824017" comment="kernel-debug-3.10.0-693.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824020" comment="kernel-doc-3.10.0-693.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824021" comment="kernel-headers-3.10.0-693.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824022" comment="kernel-tools-3.10.0-693.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824023" comment="kernel-tools-libs-3.10.0-693.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824025" comment="perf-3.10.0-693.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824026" comment="python-perf-3.10.0-693.21.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:560" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0406.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0406.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7890">CVE-2017-7890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824027" comment="php-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824028" comment="php-bcmath-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824029" comment="php-cli-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824030" comment="php-common-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824031" comment="php-dba-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824032" comment="php-devel-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824033" comment="php-embedded-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824034" comment="php-enchant-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824035" comment="php-fpm-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824036" comment="php-gd-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824037" comment="php-intl-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824038" comment="php-ldap-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824039" comment="php-mbstring-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824040" comment="php-mysql-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824041" comment="php-mysqlnd-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824042" comment="php-odbc-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824043" comment="php-pdo-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824044" comment="php-pgsql-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824045" comment="php-process-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824046" comment="php-pspell-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824047" comment="php-recode-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824048" comment="php-snmp-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824049" comment="php-soap-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824050" comment="php-xml-5.4.16-43.el7_4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824051" comment="php-xmlrpc-5.4.16-43.el7_4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:561" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-15135" ref_url="https://www.suse.com/security/cve/CVE-2017-15135/" source="CVE"/>
		<reference ref_id="CVE-2018-1054" ref_url="https://www.suse.com/security/cve/CVE-2018-1054/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0414.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0414.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15135/">CVE-2017-15135 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15135">CVE-2017-15135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1054/">CVE-2018-1054 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1054">CVE-2018-1054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824052" comment="389-ds-base-1.3.6.1-28.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824053" comment="389-ds-base-devel-1.3.6.1-28.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824054" comment="389-ds-base-libs-1.3.6.1-28.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824055" comment="389-ds-base-snmp-1.3.6.1-28.el7_4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:562" version="1" class="patch">
	<metadata>
		<title>security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0483.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0483.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5732">CVE-2018-5732 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5733">CVE-2018-5733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824056" comment="dhclient-4.2.5-58.el7_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824057" comment="dhcp-4.2.5-58.el7_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824058" comment="dhcp-common-4.2.5-58.el7_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824059" comment="dhcp-devel-4.2.5-58.el7_4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824060" comment="dhcp-libs-4.2.5-58.el7_4.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:563" version="1" class="patch">
	<metadata>
		<title>security update for mailman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5950" ref_url="https://www.suse.com/security/cve/CVE-2018-5950/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0505.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0505.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5950/">CVE-2018-5950 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5950">CVE-2018-5950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824061" comment="mailman-2.1.15-26.el7_4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:564" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0527.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0527.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5125">CVE-2018-5125 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5127">CVE-2018-5127 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5129">CVE-2018-5129 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5130">CVE-2018-5130 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5131">CVE-2018-5131 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5144">CVE-2018-5144 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5145">CVE-2018-5145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824062" comment="firefox-52.7.0-1.el7_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:565" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0549.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0549.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824063" comment="firefox-52.7.2-1.el7_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:566" version="1" class="patch">
	<metadata>
		<title>security update for slf4j (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-8088" ref_url="https://www.suse.com/security/cve/CVE-2018-8088/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0592.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0592.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8088/">CVE-2018-8088 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8088">CVE-2018-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824064" comment="slf4j-1.7.4-4.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824065" comment="slf4j-javadoc-1.7.4-4.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824066" comment="slf4j-manual-1.7.4-4.el7_4 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824064" comment="slf4j-1.7.4-4.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824065" comment="slf4j-javadoc-1.7.4-4.el7_4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824066" comment="slf4j-manual-1.7.4-4.el7_4 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:567" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0648.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0648.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5125">CVE-2018-5125 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5127">CVE-2018-5127 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5129">CVE-2018-5129 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5144">CVE-2018-5144 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5145">CVE-2018-5145 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824067" comment="thunderbird-52.7.0-1.el7_4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:568" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-11368" ref_url="https://www.suse.com/security/cve/CVE-2017-11368/" source="CVE"/>
		<reference ref_id="CVE-2017-7562" ref_url="https://www.suse.com/security/cve/CVE-2017-7562/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0666.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0666.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11368/">CVE-2017-11368 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11368">CVE-2017-11368 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7562/">CVE-2017-7562 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7562">CVE-2017-7562 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824068" comment="krb5-devel-1.15.1-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824069" comment="krb5-libs-1.15.1-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824070" comment="krb5-pkinit-1.15.1-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824071" comment="krb5-server-1.15.1-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824072" comment="krb5-server-ldap-1.15.1-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824073" comment="krb5-workstation-1.15.1-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824074" comment="libkadm5-1.15.1-18.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:569" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0805.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0805.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9402">CVE-2014-9402 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5180">CVE-2015-5180 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12132">CVE-2017-12132 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15670">CVE-2017-15670 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15804">CVE-2017-15804 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000001">CVE-2018-1000001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824075" comment="glibc-2.17-222.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824076" comment="glibc-common-2.17-222.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824077" comment="glibc-devel-2.17-222.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824078" comment="glibc-headers-2.17-222.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824079" comment="glibc-static-2.17-222.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824080" comment="glibc-utils-2.17-222.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824081" comment="nscd-2.17-222.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:570" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13711" ref_url="https://www.suse.com/security/cve/CVE-2017-13711/" source="CVE"/>
		<reference ref_id="CVE-2017-15124" ref_url="https://www.suse.com/security/cve/CVE-2017-15124/" source="CVE"/>
		<reference ref_id="CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268/" source="CVE"/>
		<reference ref_id="CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0816.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0816.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13672">CVE-2017-13672 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13711/">CVE-2017-13711 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13711">CVE-2017-13711 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15124/">CVE-2017-15124 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15124">CVE-2017-15124 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15268">CVE-2017-15268 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5683">CVE-2018-5683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824082" comment="qemu-img-1.5.3-156.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824083" comment="qemu-kvm-1.5.3-156.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824084" comment="qemu-kvm-common-1.5.3-156.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824085" comment="qemu-kvm-tools-1.5.3-156.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:571" version="1" class="patch">
	<metadata>
		<title>security update for xdg-user-dirs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-15131" ref_url="https://www.suse.com/security/cve/CVE-2017-15131/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0842.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0842.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15131/">CVE-2017-15131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15131">CVE-2017-15131 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824086" comment="xdg-user-dirs-0.15-5.el7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824086" comment="xdg-user-dirs-0.15-5.el7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:572" version="1" class="patch">
	<metadata>
		<title>security update for gcc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-11671" ref_url="https://www.suse.com/security/cve/CVE-2017-11671/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0849.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0849.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11671/">CVE-2017-11671 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11671">CVE-2017-11671 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824087" comment="cpp-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824088" comment="gcc-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824089" comment="gcc-c++-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824090" comment="gcc-gfortran-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824091" comment="gcc-gnat-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824092" comment="gcc-go-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824093" comment="gcc-objc-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824094" comment="gcc-objc++-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824095" comment="gcc-plugin-devel-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824096" comment="libasan-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824097" comment="libasan-static-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824098" comment="libatomic-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824099" comment="libatomic-static-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824100" comment="libgcc-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824101" comment="libgfortran-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824102" comment="libgfortran-static-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824103" comment="libgnat-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824104" comment="libgnat-devel-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824105" comment="libgnat-static-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824106" comment="libgo-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824107" comment="libgo-devel-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824108" comment="libgo-static-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824109" comment="libgomp-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824110" comment="libitm-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824111" comment="libitm-devel-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824112" comment="libitm-static-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824113" comment="libmudflap-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824114" comment="libmudflap-devel-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824115" comment="libmudflap-static-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824116" comment="libobjc-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824117" comment="libquadmath-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824118" comment="libquadmath-devel-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824119" comment="libquadmath-static-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824120" comment="libstdc++-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824121" comment="libstdc++-devel-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824122" comment="libstdc++-docs-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824123" comment="libstdc++-static-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824124" comment="libtsan-4.8.5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824125" comment="libtsan-static-4.8.5-28.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:573" version="1" class="patch">
	<metadata>
		<title>security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462/" source="CVE"/>
		<reference ref_id="CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463/" source="CVE"/>
		<reference ref_id="CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0855.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0855.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6462">CVE-2017-6462 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6463">CVE-2017-6463 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6464">CVE-2017-6464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824126" comment="ntp-4.2.6p5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824127" comment="ntp-doc-4.2.6p5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824128" comment="ntp-perl-4.2.6p5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824129" comment="ntpdate-4.2.6p5-28.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824130" comment="sntp-4.2.6p5-28.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:574" version="1" class="patch">
	<metadata>
		<title>security update for golang (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-15041" ref_url="https://www.suse.com/security/cve/CVE-2017-15041/" source="CVE"/>
		<reference ref_id="CVE-2017-15042" ref_url="https://www.suse.com/security/cve/CVE-2017-15042/" source="CVE"/>
		<reference ref_id="CVE-2018-6574" ref_url="https://www.suse.com/security/cve/CVE-2018-6574/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0878.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0878.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15041/">CVE-2017-15041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15041">CVE-2017-15041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15042/">CVE-2017-15042 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15042">CVE-2017-15042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6574/">CVE-2018-6574 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6574">CVE-2018-6574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824131" comment="golang-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824132" comment="golang-bin-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824133" comment="golang-docs-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824134" comment="golang-misc-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824135" comment="golang-src-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824136" comment="golang-tests-1.9.4-1.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824131" comment="golang-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824132" comment="golang-bin-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824133" comment="golang-docs-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824134" comment="golang-misc-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824135" comment="golang-src-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824136" comment="golang-tests-1.9.4-1.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:575" version="1" class="patch">
	<metadata>
		<title>security update for policycoreutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0913.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0913.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1063">CVE-2018-1063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824137" comment="policycoreutils-2.5-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824138" comment="policycoreutils-devel-2.5-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824139" comment="policycoreutils-gui-2.5-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824140" comment="policycoreutils-newrole-2.5-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824141" comment="policycoreutils-python-2.5-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824142" comment="policycoreutils-restorecond-2.5-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824143" comment="policycoreutils-sandbox-2.5-22.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:576" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0980.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0980.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15906">CVE-2017-15906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824144" comment="openssh-7.4p1-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824145" comment="openssh-askpass-7.4p1-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824146" comment="openssh-cavs-7.4p1-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824147" comment="openssh-clients-7.4p1-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824148" comment="openssh-keycat-7.4p1-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824149" comment="openssh-ldap-7.4p1-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824150" comment="openssh-server-7.4p1-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824151" comment="openssh-server-sysvinit-7.4p1-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824152" comment="pam_ssh_agent_auth-0.10.3-2.16.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:577" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3737" ref_url="https://www.suse.com/security/cve/CVE-2017-3737/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:0998.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:0998.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3736">CVE-2017-3736 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3737/">CVE-2017-3737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3737">CVE-2017-3737 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3738">CVE-2017-3738 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824153" comment="openssl-1.0.2k-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824154" comment="openssl-devel-1.0.2k-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824155" comment="openssl-libs-1.0.2k-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824156" comment="openssl-perl-1.0.2k-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824157" comment="openssl-static-1.0.2k-12.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:578" version="1" class="patch">
	<metadata>
		<title>security update for libvncserver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1055.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1055.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7225">CVE-2018-7225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824158" comment="libvncserver-0.9.9-12.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824159" comment="libvncserver-devel-0.9.9-12.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:579" version="1" class="patch">
	<metadata>
		<title>security update for libvorbis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1058.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1058.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824160" comment="libvorbis-1.3.3-8.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824161" comment="libvorbis-devel-1.3.3-8.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824162" comment="libvorbis-devel-docs-1.3.3-8.el7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824160" comment="libvorbis-1.3.3-8.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824161" comment="libvorbis-devel-1.3.3-8.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824162" comment="libvorbis-devel-docs-1.3.3-8.el7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:580" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1000119" ref_url="https://www.suse.com/security/cve/CVE-2018-1000119/" source="CVE"/>
		<reference ref_id="CVE-2018-1079" ref_url="https://www.suse.com/security/cve/CVE-2018-1079/" source="CVE"/>
		<reference ref_id="CVE-2018-1086" ref_url="https://www.suse.com/security/cve/CVE-2018-1086/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1060.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1060.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000119/">CVE-2018-1000119 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000119">CVE-2018-1000119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1079/">CVE-2018-1079 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1079">CVE-2018-1079 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1086/">CVE-2018-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1086">CVE-2018-1086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824163" comment="pcs-0.9.162-5.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824164" comment="pcs-snmp-0.9.162-5.el7_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:581" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-3672" ref_url="https://www.suse.com/security/cve/CVE-2016-3672/" source="CVE"/>
		<reference ref_id="CVE-2016-7913" ref_url="https://www.suse.com/security/cve/CVE-2016-7913/" source="CVE"/>
		<reference ref_id="CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633/" source="CVE"/>
		<reference ref_id="CVE-2017-1000252" ref_url="https://www.suse.com/security/cve/CVE-2017-1000252/" source="CVE"/>
		<reference ref_id="CVE-2017-1000407" ref_url="https://www.suse.com/security/cve/CVE-2017-1000407/" source="CVE"/>
		<reference ref_id="CVE-2017-1000410" ref_url="https://www.suse.com/security/cve/CVE-2017-1000410/" source="CVE"/>
		<reference ref_id="CVE-2017-12154" ref_url="https://www.suse.com/security/cve/CVE-2017-12154/" source="CVE"/>
		<reference ref_id="CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190/" source="CVE"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-14140" ref_url="https://www.suse.com/security/cve/CVE-2017-14140/" source="CVE"/>
		<reference ref_id="CVE-2017-15116" ref_url="https://www.suse.com/security/cve/CVE-2017-15116/" source="CVE"/>
		<reference ref_id="CVE-2017-15121" ref_url="https://www.suse.com/security/cve/CVE-2017-15121/" source="CVE"/>
		<reference ref_id="CVE-2017-15126" ref_url="https://www.suse.com/security/cve/CVE-2017-15126/" source="CVE"/>
		<reference ref_id="CVE-2017-15127" ref_url="https://www.suse.com/security/cve/CVE-2017-15127/" source="CVE"/>
		<reference ref_id="CVE-2017-15129" ref_url="https://www.suse.com/security/cve/CVE-2017-15129/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-17448" ref_url="https://www.suse.com/security/cve/CVE-2017-17448/" source="CVE"/>
		<reference ref_id="CVE-2017-17449" ref_url="https://www.suse.com/security/cve/CVE-2017-17449/" source="CVE"/>
		<reference ref_id="CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558/" source="CVE"/>
		<reference ref_id="CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017/" source="CVE"/>
		<reference ref_id="CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203/" source="CVE"/>
		<reference ref_id="CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="CVE-2017-9725" ref_url="https://www.suse.com/security/cve/CVE-2017-9725/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-5750" ref_url="https://www.suse.com/security/cve/CVE-2018-5750/" source="CVE"/>
		<reference ref_id="CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1062.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1062.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3672/">CVE-2016-3672 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3672">CVE-2016-3672 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7913/">CVE-2016-7913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7913">CVE-2016-7913 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8633">CVE-2016-8633 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000252/">CVE-2017-1000252 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000252">CVE-2017-1000252 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000407/">CVE-2017-1000407 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000407">CVE-2017-1000407 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000410/">CVE-2017-1000410 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000410">CVE-2017-1000410 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12154/">CVE-2017-12154 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12154">CVE-2017-12154 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12190">CVE-2017-12190 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13166">CVE-2017-13166 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14140/">CVE-2017-14140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14140">CVE-2017-14140 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15116/">CVE-2017-15116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15116">CVE-2017-15116 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15121/">CVE-2017-15121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15121">CVE-2017-15121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15126/">CVE-2017-15126 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15126">CVE-2017-15126 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15127/">CVE-2017-15127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15127">CVE-2017-15127 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-15129/">CVE-2017-15129 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15129">CVE-2017-15129 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15265">CVE-2017-15265 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17448/">CVE-2017-17448 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17448">CVE-2017-17448 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17449/">CVE-2017-17449 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17449">CVE-2017-17449 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17558">CVE-2017-17558 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18017">CVE-2017-18017 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18203">CVE-2017-18203 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7294">CVE-2017-7294 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8824">CVE-2017-8824 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9725/">CVE-2017-9725 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9725">CVE-2017-9725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000004">CVE-2018-1000004 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5750/">CVE-2018-5750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5750">CVE-2018-5750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6927">CVE-2018-6927 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824165" comment="kernel-3.10.0-862.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824166" comment="kernel-abi-whitelists-3.10.0-862.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824167" comment="kernel-debug-3.10.0-862.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824170" comment="kernel-doc-3.10.0-862.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824171" comment="kernel-headers-3.10.0-862.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824172" comment="kernel-tools-3.10.0-862.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824173" comment="kernel-tools-libs-3.10.0-862.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824175" comment="perf-3.10.0-862.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824176" comment="python-perf-3.10.0-862.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:582" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1099.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1099.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5148">CVE-2018-5148 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824177" comment="firefox-52.7.3-1.el7_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:583" version="1" class="patch">
	<metadata>
		<title>security update for corosync (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1084" ref_url="https://www.suse.com/security/cve/CVE-2018-1084/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1169.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1169.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1084/">CVE-2018-1084 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1084">CVE-2018-1084 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824178" comment="corosync-2.4.3-2.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824179" comment="corosync-qdevice-2.4.3-2.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824180" comment="corosync-qnetd-2.4.3-2.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824181" comment="corosynclib-2.4.3-2.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824182" comment="corosynclib-devel-2.4.3-2.el7_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:584" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1191.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1191.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2790">CVE-2018-2790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2794">CVE-2018-2794 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2795">CVE-2018-2795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2796">CVE-2018-2796 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2797">CVE-2018-2797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2798">CVE-2018-2798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2799">CVE-2018-2799 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2800">CVE-2018-2800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2814">CVE-2018-2814 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2815">CVE-2018-2815 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824183" comment="java-1.8.0-openjdk-1.8.0.171-7.b10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824184" comment="java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824185" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824186" comment="java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824187" comment="java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824188" comment="java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824189" comment="java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824190" comment="java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824191" comment="java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824192" comment="java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824193" comment="java-1.8.0-openjdk-javadoc-1.8.0.171-7.b10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824194" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.171-7.b10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824195" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.171-7.b10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824196" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-7.b10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824197" comment="java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824198" comment="java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:585" version="1" class="patch">
	<metadata>
		<title>security update for patch (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1200.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1200.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000156">CVE-2018-1000156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824199" comment="patch-2.7.1-10.el7_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:586" version="1" class="patch">
	<metadata>
		<title>security update for librelp (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-1000140" ref_url="https://www.suse.com/security/cve/CVE-2018-1000140/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1223.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1223.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000140/">CVE-2018-1000140 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000140">CVE-2018-1000140 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824200" comment="librelp-1.2.12-1.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824201" comment="librelp-devel-1.2.12-1.el7_5.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824200" comment="librelp-1.2.12-1.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824201" comment="librelp-devel-1.2.12-1.el7_5.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:587" version="1" class="patch">
	<metadata>
		<title>security update for PackageKit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1106" ref_url="https://www.suse.com/security/cve/CVE-2018-1106/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1224.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1224.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1106/">CVE-2018-1106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1106">CVE-2018-1106 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824202" comment="PackageKit-1.1.5-2.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824203" comment="PackageKit-command-not-found-1.1.5-2.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824204" comment="PackageKit-cron-1.1.5-2.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824205" comment="PackageKit-glib-1.1.5-2.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824206" comment="PackageKit-glib-devel-1.1.5-2.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824207" comment="PackageKit-gstreamer-plugin-1.1.5-2.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824208" comment="PackageKit-gtk3-module-1.1.5-2.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824209" comment="PackageKit-yum-1.1.5-2.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824210" comment="PackageKit-yum-plugin-1.1.5-2.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:588" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1278.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1278.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2790">CVE-2018-2790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2794">CVE-2018-2794 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2795">CVE-2018-2795 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2796">CVE-2018-2796 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2797">CVE-2018-2797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2798">CVE-2018-2798 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2799">CVE-2018-2799 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2800">CVE-2018-2800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2814">CVE-2018-2814 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2815">CVE-2018-2815 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824211" comment="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824212" comment="java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824213" comment="java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824214" comment="java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824215" comment="java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824216" comment="java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824217" comment="java-1.7.0-openjdk-src-1.7.0.181-2.6.14.5.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:589" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087/" source="CVE"/>
		<reference ref_id="CVE-2018-1091" ref_url="https://www.suse.com/security/cve/CVE-2018-1091/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1318.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1318.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16939">CVE-2017-16939 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000199">CVE-2018-1000199 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1068">CVE-2018-1068 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1087">CVE-2018-1087 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1091/">CVE-2018-1091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1091">CVE-2018-1091 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8897">CVE-2018-8897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824218" comment="kernel-3.10.0-862.2.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824219" comment="kernel-abi-whitelists-3.10.0-862.2.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824220" comment="kernel-debug-3.10.0-862.2.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824223" comment="kernel-doc-3.10.0-862.2.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824224" comment="kernel-headers-3.10.0-862.2.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824225" comment="kernel-tools-3.10.0-862.2.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824226" comment="kernel-tools-libs-3.10.0-862.2.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824228" comment="perf-3.10.0-862.2.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824229" comment="python-perf-3.10.0-862.2.3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:590" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1089" ref_url="https://www.suse.com/security/cve/CVE-2018-1089/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1380.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1380.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1089/">CVE-2018-1089 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1089">CVE-2018-1089 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824230" comment="389-ds-base-1.3.7.5-21.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824231" comment="389-ds-base-devel-1.3.7.5-21.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824232" comment="389-ds-base-libs-1.3.7.5-21.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824233" comment="389-ds-base-snmp-1.3.7.5-21.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:591" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1396.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1396.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1064">CVE-2018-1064 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5748">CVE-2018-5748 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824234" comment="libvirt-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824235" comment="libvirt-admin-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824236" comment="libvirt-client-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824237" comment="libvirt-daemon-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824238" comment="libvirt-daemon-config-network-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824239" comment="libvirt-daemon-config-nwfilter-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824240" comment="libvirt-daemon-driver-interface-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824241" comment="libvirt-daemon-driver-lxc-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824242" comment="libvirt-daemon-driver-network-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824243" comment="libvirt-daemon-driver-nodedev-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824244" comment="libvirt-daemon-driver-nwfilter-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824245" comment="libvirt-daemon-driver-qemu-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824246" comment="libvirt-daemon-driver-secret-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824247" comment="libvirt-daemon-driver-storage-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824248" comment="libvirt-daemon-driver-storage-core-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824249" comment="libvirt-daemon-driver-storage-disk-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824250" comment="libvirt-daemon-driver-storage-gluster-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824251" comment="libvirt-daemon-driver-storage-iscsi-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824252" comment="libvirt-daemon-driver-storage-logical-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824253" comment="libvirt-daemon-driver-storage-mpath-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824254" comment="libvirt-daemon-driver-storage-rbd-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824255" comment="libvirt-daemon-driver-storage-scsi-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824256" comment="libvirt-daemon-kvm-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824257" comment="libvirt-daemon-lxc-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824258" comment="libvirt-devel-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824259" comment="libvirt-docs-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824260" comment="libvirt-libs-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824261" comment="libvirt-lock-sanlock-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824262" comment="libvirt-login-shell-3.9.0-14.el7_5.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824263" comment="libvirt-nss-3.9.0-14.el7_5.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:592" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1415.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1415.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5157">CVE-2018-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5158">CVE-2018-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5178">CVE-2018-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5183">CVE-2018-5183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824264" comment="firefox-52.8.0-1.el7_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:593" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1416.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1416.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7858">CVE-2018-7858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824265" comment="qemu-img-1.5.3-156.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824266" comment="qemu-kvm-1.5.3-156.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824267" comment="qemu-kvm-common-1.5.3-156.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824268" comment="qemu-kvm-tools-1.5.3-156.el7_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:594" version="1" class="patch">
	<metadata>
		<title>security update for dhcp (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1111" ref_url="https://www.suse.com/security/cve/CVE-2018-1111/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1453.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1453.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1111/">CVE-2018-1111 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1111">CVE-2018-1111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824269" comment="dhclient-4.2.5-68.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824270" comment="dhcp-4.2.5-68.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824271" comment="dhcp-common-4.2.5-68.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824272" comment="dhcp-devel-4.2.5-68.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824273" comment="dhcp-libs-4.2.5-68.el7_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:595" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1629.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1629.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824274" comment="kernel-3.10.0-862.3.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824275" comment="kernel-abi-whitelists-3.10.0-862.3.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824276" comment="kernel-debug-3.10.0-862.3.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824279" comment="kernel-doc-3.10.0-862.3.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824280" comment="kernel-headers-3.10.0-862.3.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824281" comment="kernel-tools-3.10.0-862.3.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824282" comment="kernel-tools-libs-3.10.0-862.3.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824284" comment="perf-3.10.0-862.3.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824285" comment="python-perf-3.10.0-862.3.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:596" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1632.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1632.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824286" comment="libvirt-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824287" comment="libvirt-admin-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824288" comment="libvirt-client-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824289" comment="libvirt-daemon-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824290" comment="libvirt-daemon-config-network-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824291" comment="libvirt-daemon-config-nwfilter-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824292" comment="libvirt-daemon-driver-interface-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824293" comment="libvirt-daemon-driver-lxc-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824294" comment="libvirt-daemon-driver-network-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824295" comment="libvirt-daemon-driver-nodedev-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824296" comment="libvirt-daemon-driver-nwfilter-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824297" comment="libvirt-daemon-driver-qemu-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824298" comment="libvirt-daemon-driver-secret-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824299" comment="libvirt-daemon-driver-storage-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824300" comment="libvirt-daemon-driver-storage-core-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824301" comment="libvirt-daemon-driver-storage-disk-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824302" comment="libvirt-daemon-driver-storage-gluster-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824303" comment="libvirt-daemon-driver-storage-iscsi-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824304" comment="libvirt-daemon-driver-storage-logical-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824305" comment="libvirt-daemon-driver-storage-mpath-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824306" comment="libvirt-daemon-driver-storage-rbd-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824307" comment="libvirt-daemon-driver-storage-scsi-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824308" comment="libvirt-daemon-kvm-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824309" comment="libvirt-daemon-lxc-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824310" comment="libvirt-devel-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824311" comment="libvirt-docs-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824312" comment="libvirt-libs-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824313" comment="libvirt-lock-sanlock-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824314" comment="libvirt-login-shell-3.9.0-14.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824315" comment="libvirt-nss-3.9.0-14.el7_5.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:597" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1633.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1633.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824316" comment="qemu-img-1.5.3-156.el7_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824317" comment="qemu-kvm-1.5.3-156.el7_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824318" comment="qemu-kvm-common-1.5.3-156.el7_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824319" comment="qemu-kvm-tools-1.5.3-156.el7_5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:598" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1648.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1648.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824320" comment="java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824321" comment="java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.8.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824322" comment="java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.8.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824323" comment="java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.8.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824324" comment="java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.8.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824325" comment="java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.8.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824326" comment="java-1.7.0-openjdk-src-1.7.0.181-2.6.14.8.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:599" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1649.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1649.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824327" comment="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824328" comment="java-1.8.0-openjdk-accessibility-1.8.0.171-8.b10.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824329" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.171-8.b10.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824330" comment="java-1.8.0-openjdk-debug-1.8.0.171-8.b10.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824331" comment="java-1.8.0-openjdk-demo-1.8.0.171-8.b10.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824332" comment="java-1.8.0-openjdk-demo-debug-1.8.0.171-8.b10.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824333" comment="java-1.8.0-openjdk-devel-1.8.0.171-8.b10.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824334" comment="java-1.8.0-openjdk-devel-debug-1.8.0.171-8.b10.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824335" comment="java-1.8.0-openjdk-headless-1.8.0.171-8.b10.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824336" comment="java-1.8.0-openjdk-headless-debug-1.8.0.171-8.b10.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824337" comment="java-1.8.0-openjdk-javadoc-1.8.0.171-8.b10.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824338" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.171-8.b10.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824339" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.171-8.b10.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824340" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-8.b10.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824341" comment="java-1.8.0-openjdk-src-1.8.0.171-8.b10.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824342" comment="java-1.8.0-openjdk-src-debug-1.8.0.171-8.b10.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:600" version="1" class="patch">
	<metadata>
		<title>security update for procps-ng (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1700.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1700.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1124">CVE-2018-1124 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1126">CVE-2018-1126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824343" comment="procps-ng-3.3.10-17.el7_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824344" comment="procps-ng-devel-3.3.10-17.el7_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824345" comment="procps-ng-i18n-3.3.10-17.el7_5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:601" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5161" ref_url="https://www.suse.com/security/cve/CVE-2018-5161/" source="CVE"/>
		<reference ref_id="CVE-2018-5162" ref_url="https://www.suse.com/security/cve/CVE-2018-5162/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5170" ref_url="https://www.suse.com/security/cve/CVE-2018-5170/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2018-5184" ref_url="https://www.suse.com/security/cve/CVE-2018-5184/" source="CVE"/>
		<reference ref_id="CVE-2018-5185" ref_url="https://www.suse.com/security/cve/CVE-2018-5185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1725.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1725.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5150">CVE-2018-5150 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5154">CVE-2018-5154 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5155">CVE-2018-5155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5159">CVE-2018-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5161/">CVE-2018-5161 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5161">CVE-2018-5161 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5162/">CVE-2018-5162 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5162">CVE-2018-5162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5168">CVE-2018-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5170/">CVE-2018-5170 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5170">CVE-2018-5170 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5178">CVE-2018-5178 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5183">CVE-2018-5183 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5184/">CVE-2018-5184 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5184">CVE-2018-5184 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-5185/">CVE-2018-5185 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5185">CVE-2018-5185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824346" comment="thunderbird-52.8.0-1.el7_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:602" version="1" class="patch">
	<metadata>
		<title>security update for xmlrpc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-5003" ref_url="https://www.suse.com/security/cve/CVE-2016-5003/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1780.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1780.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5003/">CVE-2016-5003 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5003">CVE-2016-5003 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824347" comment="xmlrpc-client-3.1.3-9.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824348" comment="xmlrpc-common-3.1.3-9.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824349" comment="xmlrpc-javadoc-3.1.3-9.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824350" comment="xmlrpc-server-3.1.3-9.el7_5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824347" comment="xmlrpc-client-3.1.3-9.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824348" comment="xmlrpc-common-3.1.3-9.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824349" comment="xmlrpc-javadoc-3.1.3-9.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824350" comment="xmlrpc-server-3.1.3-9.el7_5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:603" version="1" class="patch">
	<metadata>
		<title>security update for plexus-archiver (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1002200" ref_url="https://www.suse.com/security/cve/CVE-2018-1002200/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1836.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1836.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1002200/">CVE-2018-1002200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1002200">CVE-2018-1002200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824351" comment="plexus-archiver-2.4.2-5.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824352" comment="plexus-archiver-javadoc-2.4.2-5.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:604" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1852.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1852.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3665">CVE-2018-3665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824353" comment="kernel-3.10.0-862.3.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824354" comment="kernel-abi-whitelists-3.10.0-862.3.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824355" comment="kernel-debug-3.10.0-862.3.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824358" comment="kernel-doc-3.10.0-862.3.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824359" comment="kernel-headers-3.10.0-862.3.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824360" comment="kernel-tools-3.10.0-862.3.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824361" comment="kernel-tools-libs-3.10.0-862.3.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824363" comment="perf-3.10.0-862.3.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824364" comment="python-perf-3.10.0-862.3.3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:605" version="1" class="patch">
	<metadata>
		<title>security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1957.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1957.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11235">CVE-2018-11235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824365" comment="emacs-git-1.8.3.1-14.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824366" comment="emacs-git-el-1.8.3.1-14.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824367" comment="git-1.8.3.1-14.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824368" comment="git-all-1.8.3.1-14.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824369" comment="git-bzr-1.8.3.1-14.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824370" comment="git-cvs-1.8.3.1-14.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824371" comment="git-daemon-1.8.3.1-14.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824372" comment="git-email-1.8.3.1-14.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824373" comment="git-gui-1.8.3.1-14.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824374" comment="git-hg-1.8.3.1-14.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824375" comment="git-p4-1.8.3.1-14.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824376" comment="git-svn-1.8.3.1-14.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824377" comment="gitk-1.8.3.1-14.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824378" comment="gitweb-1.8.3.1-14.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824379" comment="perl-Git-1.8.3.1-14.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824380" comment="perl-Git-SVN-1.8.3.1-14.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:606" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1965.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1965.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11600">CVE-2017-11600 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824381" comment="kernel-3.10.0-862.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824382" comment="kernel-abi-whitelists-3.10.0-862.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824383" comment="kernel-debug-3.10.0-862.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824386" comment="kernel-doc-3.10.0-862.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824387" comment="kernel-headers-3.10.0-862.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824388" comment="kernel-tools-3.10.0-862.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824389" comment="kernel-tools-libs-3.10.0-862.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824391" comment="perf-3.10.0-862.6.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824392" comment="python-perf-3.10.0-862.6.3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:607" version="1" class="patch">
	<metadata>
		<title>security update for pki-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1080" ref_url="https://www.suse.com/security/cve/CVE-2018-1080/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1979.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1979.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1080/">CVE-2018-1080 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1080">CVE-2018-1080 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824393" comment="pki-base-10.5.1-13.1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824394" comment="pki-base-java-10.5.1-13.1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824395" comment="pki-ca-10.5.1-13.1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824396" comment="pki-javadoc-10.5.1-13.1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824397" comment="pki-kra-10.5.1-13.1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824398" comment="pki-server-10.5.1-13.1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824399" comment="pki-symkey-10.5.1-13.1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824400" comment="pki-tools-10.5.1-13.1.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:608" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:1997.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:1997.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824401" comment="libvirt-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824402" comment="libvirt-admin-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824403" comment="libvirt-client-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824404" comment="libvirt-daemon-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824405" comment="libvirt-daemon-config-network-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824406" comment="libvirt-daemon-config-nwfilter-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824407" comment="libvirt-daemon-driver-interface-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824408" comment="libvirt-daemon-driver-lxc-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824409" comment="libvirt-daemon-driver-network-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824410" comment="libvirt-daemon-driver-nodedev-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824411" comment="libvirt-daemon-driver-nwfilter-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824412" comment="libvirt-daemon-driver-qemu-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824413" comment="libvirt-daemon-driver-secret-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824414" comment="libvirt-daemon-driver-storage-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824415" comment="libvirt-daemon-driver-storage-core-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824416" comment="libvirt-daemon-driver-storage-disk-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824417" comment="libvirt-daemon-driver-storage-gluster-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824418" comment="libvirt-daemon-driver-storage-iscsi-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824419" comment="libvirt-daemon-driver-storage-logical-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824420" comment="libvirt-daemon-driver-storage-mpath-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824421" comment="libvirt-daemon-driver-storage-rbd-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824422" comment="libvirt-daemon-driver-storage-scsi-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824423" comment="libvirt-daemon-kvm-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824424" comment="libvirt-daemon-lxc-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824425" comment="libvirt-devel-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824426" comment="libvirt-docs-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824427" comment="libvirt-libs-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824428" comment="libvirt-lock-sanlock-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824429" comment="libvirt-login-shell-3.9.0-14.el7_5.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824430" comment="libvirt-nss-3.9.0-14.el7_5.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:609" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2001.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2001.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824431" comment="qemu-img-1.5.3-156.el7_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824432" comment="qemu-kvm-1.5.3-156.el7_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824433" comment="qemu-kvm-common-1.5.3-156.el7_5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824434" comment="qemu-kvm-tools-1.5.3-156.el7_5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:610" version="1" class="patch">
	<metadata>
		<title>security update for dpdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1059" ref_url="https://www.suse.com/security/cve/CVE-2018-1059/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2038.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2038.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1059/">CVE-2018-1059 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1059">CVE-2018-1059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824435" comment="dpdk-17.11-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824436" comment="dpdk-devel-17.11-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824437" comment="dpdk-doc-17.11-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824438" comment="dpdk-tools-17.11-11.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:611" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-7762" ref_url="https://www.suse.com/security/cve/CVE-2017-7762/" source="CVE"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2113.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2113.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7762/">CVE-2017-7762 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7762">CVE-2017-7762 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12359">CVE-2018-12359 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12360">CVE-2018-12360 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12362">CVE-2018-12362 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12363">CVE-2018-12363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12364">CVE-2018-12364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12365">CVE-2018-12365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12366">CVE-2018-12366 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5156">CVE-2018-5156 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5188">CVE-2018-5188 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6126">CVE-2018-6126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824439" comment="firefox-60.1.0-4.el7_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:612" version="1" class="patch">
	<metadata>
		<title>security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2123.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2123.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824440" comment="python-2.7.5-69.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824441" comment="python-debug-2.7.5-69.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824442" comment="python-devel-2.7.5-69.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824443" comment="python-libs-2.7.5-69.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824444" comment="python-test-2.7.5-69.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824445" comment="python-tools-2.7.5-69.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824446" comment="tkinter-2.7.5-69.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:613" version="1" class="patch">
	<metadata>
		<title>security update for gnupg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2181.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2181.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12020">CVE-2018-12020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824447" comment="gnupg2-2.0.22-5.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824448" comment="gnupg2-smime-2.0.22-5.el7_5 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824447" comment="gnupg2-2.0.22-5.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824448" comment="gnupg2-smime-2.0.22-5.el7_5 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:614" version="1" class="patch">
	<metadata>
		<title>security update for openslp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2240.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2240.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17833">CVE-2017-17833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824449" comment="openslp-2.0.0-7.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824450" comment="openslp-devel-2.0.0-7.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824451" comment="openslp-server-2.0.0-7.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:615" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2242.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2242.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824452" comment="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824453" comment="java-1.8.0-openjdk-accessibility-1.8.0.181-3.b13.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824454" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.181-3.b13.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824455" comment="java-1.8.0-openjdk-debug-1.8.0.181-3.b13.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824456" comment="java-1.8.0-openjdk-demo-1.8.0.181-3.b13.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824457" comment="java-1.8.0-openjdk-demo-debug-1.8.0.181-3.b13.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824458" comment="java-1.8.0-openjdk-devel-1.8.0.181-3.b13.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824459" comment="java-1.8.0-openjdk-devel-debug-1.8.0.181-3.b13.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824460" comment="java-1.8.0-openjdk-headless-1.8.0.181-3.b13.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824461" comment="java-1.8.0-openjdk-headless-debug-1.8.0.181-3.b13.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824462" comment="java-1.8.0-openjdk-javadoc-1.8.0.181-3.b13.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824463" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.181-3.b13.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824464" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.181-3.b13.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824465" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.181-3.b13.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824466" comment="java-1.8.0-openjdk-src-1.8.0.181-3.b13.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824467" comment="java-1.8.0-openjdk-src-debug-1.8.0.181-3.b13.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:616" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12372" ref_url="https://www.suse.com/security/cve/CVE-2018-12372/" source="CVE"/>
		<reference ref_id="CVE-2018-12373" ref_url="https://www.suse.com/security/cve/CVE-2018-12373/" source="CVE"/>
		<reference ref_id="CVE-2018-12374" ref_url="https://www.suse.com/security/cve/CVE-2018-12374/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2252.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2252.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12359">CVE-2018-12359 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12360">CVE-2018-12360 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12362">CVE-2018-12362 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12363">CVE-2018-12363 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12364">CVE-2018-12364 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12365">CVE-2018-12365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12366">CVE-2018-12366 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12372/">CVE-2018-12372 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12372">CVE-2018-12372 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12373/">CVE-2018-12373 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12373">CVE-2018-12373 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12374/">CVE-2018-12374 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12374">CVE-2018-12374 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5188">CVE-2018-5188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824468" comment="thunderbird-52.9.1-1.el7_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:617" version="1" class="patch">
	<metadata>
		<title>security update for yum-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-10897" ref_url="https://www.suse.com/security/cve/CVE-2018-10897/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2285.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2285.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10897/">CVE-2018-10897 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10897">CVE-2018-10897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824469" comment="yum-NetworkManager-dispatcher-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824470" comment="yum-plugin-aliases-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824471" comment="yum-plugin-auto-update-debug-info-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824472" comment="yum-plugin-changelog-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824473" comment="yum-plugin-copr-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824474" comment="yum-plugin-fastestmirror-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824475" comment="yum-plugin-filter-data-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824476" comment="yum-plugin-fs-snapshot-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824477" comment="yum-plugin-keys-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824478" comment="yum-plugin-list-data-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824479" comment="yum-plugin-local-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824480" comment="yum-plugin-merge-conf-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824481" comment="yum-plugin-ovl-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824482" comment="yum-plugin-post-transaction-actions-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824483" comment="yum-plugin-pre-transaction-actions-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824484" comment="yum-plugin-priorities-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824485" comment="yum-plugin-protectbase-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824486" comment="yum-plugin-ps-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824487" comment="yum-plugin-remove-with-leaves-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824488" comment="yum-plugin-rpm-warm-cache-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824489" comment="yum-plugin-show-leaves-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824490" comment="yum-plugin-tmprepo-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824491" comment="yum-plugin-tsflags-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824492" comment="yum-plugin-upgrade-helper-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824493" comment="yum-plugin-verify-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824494" comment="yum-plugin-versionlock-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824495" comment="yum-updateonboot-1.1.31-46.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824496" comment="yum-utils-1.1.31-46.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:618" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2286.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2286.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2952">CVE-2018-2952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824497" comment="java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824498" comment="java-1.7.0-openjdk-accessibility-1.7.0.191-2.6.15.4.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824499" comment="java-1.7.0-openjdk-demo-1.7.0.191-2.6.15.4.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824500" comment="java-1.7.0-openjdk-devel-1.7.0.191-2.6.15.4.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824501" comment="java-1.7.0-openjdk-headless-1.7.0.191-2.6.15.4.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824502" comment="java-1.7.0-openjdk-javadoc-1.7.0.191-2.6.15.4.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824503" comment="java-1.7.0-openjdk-src-1.7.0.191-2.6.15.4.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:619" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-13215" ref_url="https://www.suse.com/security/cve/CVE-2017-13215/" source="CVE"/>
		<reference ref_id="CVE-2018-10675" ref_url="https://www.suse.com/security/cve/CVE-2018-10675/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-3693" ref_url="https://www.suse.com/security/cve/CVE-2018-3693/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2384.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2384.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13215/">CVE-2017-13215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13215">CVE-2017-13215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10675/">CVE-2018-10675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10675">CVE-2018-10675 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3620">CVE-2018-3620 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3693/">CVE-2018-3693 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3693">CVE-2018-3693 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5390">CVE-2018-5390 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7566">CVE-2018-7566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824504" comment="kernel-3.10.0-862.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824505" comment="kernel-abi-whitelists-3.10.0-862.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824506" comment="kernel-debug-3.10.0-862.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824509" comment="kernel-doc-3.10.0-862.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824510" comment="kernel-headers-3.10.0-862.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824511" comment="kernel-tools-3.10.0-862.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824512" comment="kernel-tools-libs-3.10.0-862.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824514" comment="perf-3.10.0-862.11.6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824515" comment="python-perf-3.10.0-862.11.6.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:620" version="1" class="patch">
	<metadata>
		<title>security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="CVE-2017-10379" ref_url="https://www.suse.com/security/cve/CVE-2017-10379/" source="CVE"/>
		<reference ref_id="CVE-2017-10384" ref_url="https://www.suse.com/security/cve/CVE-2017-10384/" source="CVE"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3651" ref_url="https://www.suse.com/security/cve/CVE-2017-3651/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2439.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2439.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10268">CVE-2017-10268 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10378">CVE-2017-10378 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10379/">CVE-2017-10379 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10379">CVE-2017-10379 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10384/">CVE-2017-10384 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10384">CVE-2017-10384 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3636">CVE-2017-3636 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3641">CVE-2017-3641 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3651/">CVE-2017-3651 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3651">CVE-2017-3651 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3653">CVE-2017-3653 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2562">CVE-2018-2562 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2622">CVE-2018-2622 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2640">CVE-2018-2640 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2665">CVE-2018-2665 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2668">CVE-2018-2668 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2755">CVE-2018-2755 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2761">CVE-2018-2761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2767">CVE-2018-2767 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2771">CVE-2018-2771 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2781">CVE-2018-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2813">CVE-2018-2813 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2817">CVE-2018-2817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-2819">CVE-2018-2819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824516" comment="mariadb-5.5.60-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824517" comment="mariadb-bench-5.5.60-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824518" comment="mariadb-devel-5.5.60-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824519" comment="mariadb-embedded-5.5.60-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824520" comment="mariadb-embedded-devel-5.5.60-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824521" comment="mariadb-libs-5.5.60-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824522" comment="mariadb-server-5.5.60-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824523" comment="mariadb-test-5.5.60-1.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:621" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2462.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2462.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11806">CVE-2018-11806 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7550">CVE-2018-7550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824524" comment="qemu-img-1.5.3-156.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824525" comment="qemu-kvm-1.5.3-156.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824526" comment="qemu-kvm-common-1.5.3-156.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824527" comment="qemu-kvm-tools-1.5.3-156.el7_5.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:622" version="1" class="patch">
	<metadata>
		<title>security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2526.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2526.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14354">CVE-2018-14354 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14357">CVE-2018-14357 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14362">CVE-2018-14362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824528" comment="mutt-1.5.21-28.el7_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:623" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2557.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2557.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10915">CVE-2018-10915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824529" comment="postgresql-9.2.24-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824530" comment="postgresql-contrib-9.2.24-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824531" comment="postgresql-devel-9.2.24-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824532" comment="postgresql-docs-9.2.24-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824533" comment="postgresql-libs-9.2.24-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824534" comment="postgresql-plperl-9.2.24-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824535" comment="postgresql-plpython-9.2.24-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824536" comment="postgresql-pltcl-9.2.24-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824537" comment="postgresql-server-9.2.24-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824538" comment="postgresql-static-9.2.24-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824539" comment="postgresql-test-9.2.24-1.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824540" comment="postgresql-upgrade-9.2.24-1.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:624" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2570.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2570.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5740">CVE-2018-5740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824541" comment="bind-9.9.4-61.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824542" comment="bind-chroot-9.9.4-61.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824543" comment="bind-devel-9.9.4-61.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824544" comment="bind-libs-9.9.4-61.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824545" comment="bind-libs-lite-9.9.4-61.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824546" comment="bind-license-9.9.4-61.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824547" comment="bind-lite-devel-9.9.4-61.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824548" comment="bind-pkcs11-9.9.4-61.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824549" comment="bind-pkcs11-devel-9.9.4-61.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824550" comment="bind-pkcs11-libs-9.9.4-61.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824551" comment="bind-pkcs11-utils-9.9.4-61.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824552" comment="bind-sdb-9.9.4-61.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824553" comment="bind-sdb-chroot-9.9.4-61.el7_5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824554" comment="bind-utils-9.9.4-61.el7_5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:625" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2692.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2692.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16541">CVE-2017-16541 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12376">CVE-2018-12376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12377">CVE-2018-12377 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12378">CVE-2018-12378 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12379">CVE-2018-12379 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824555" comment="firefox-60.2.0-1.el7_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:626" version="1" class="patch">
	<metadata>
		<title>security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2731.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2731.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10873">CVE-2018-10873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824556" comment="spice-glib-0.34-3.el7_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824557" comment="spice-glib-devel-0.34-3.el7_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824558" comment="spice-gtk-tools-0.34-3.el7_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824559" comment="spice-gtk3-0.34-3.el7_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824560" comment="spice-gtk3-devel-0.34-3.el7_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824561" comment="spice-gtk3-vala-0.34-3.el7_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824562" comment="spice-server-0.14.0-2.el7_5.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824563" comment="spice-server-devel-0.14.0-2.el7_5.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:627" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-14634" ref_url="https://www.suse.com/security/cve/CVE-2018-14634/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2748.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2748.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14634/">CVE-2018-14634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14634">CVE-2018-14634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824564" comment="kernel-3.10.0-862.14.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824565" comment="kernel-abi-whitelists-3.10.0-862.14.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824566" comment="kernel-debug-3.10.0-862.14.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824569" comment="kernel-doc-3.10.0-862.14.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824570" comment="kernel-headers-3.10.0-862.14.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824571" comment="kernel-tools-3.10.0-862.14.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824572" comment="kernel-tools-libs-3.10.0-862.14.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824574" comment="perf-3.10.0-862.14.4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824575" comment="python-perf-3.10.0-862.14.4.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:628" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-10850" ref_url="https://www.suse.com/security/cve/CVE-2018-10850/" source="CVE"/>
		<reference ref_id="CVE-2018-10935" ref_url="https://www.suse.com/security/cve/CVE-2018-10935/" source="CVE"/>
		<reference ref_id="CVE-2018-14624" ref_url="https://www.suse.com/security/cve/CVE-2018-14624/" source="CVE"/>
		<reference ref_id="CVE-2018-14638" ref_url="https://www.suse.com/security/cve/CVE-2018-14638/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2757.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2757.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10850/">CVE-2018-10850 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10850">CVE-2018-10850 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10935/">CVE-2018-10935 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10935">CVE-2018-10935 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14624/">CVE-2018-14624 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14624">CVE-2018-14624 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14638/">CVE-2018-14638 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14638">CVE-2018-14638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824576" comment="389-ds-base-1.3.7.5-28.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824577" comment="389-ds-base-devel-1.3.7.5-28.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824578" comment="389-ds-base-libs-1.3.7.5-28.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824579" comment="389-ds-base-snmp-1.3.7.5-28.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:629" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-6560" ref_url="https://www.suse.com/security/cve/CVE-2018-6560/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2766.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2766.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6560/">CVE-2018-6560 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6560">CVE-2018-6560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824580" comment="flatpak-0.8.8-4.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824581" comment="flatpak-builder-0.8.8-4.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824582" comment="flatpak-devel-0.8.8-4.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824583" comment="flatpak-libs-0.8.8-4.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:630" version="1" class="patch">
	<metadata>
		<title>security update for nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2768.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2768.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12384">CVE-2018-12384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824584" comment="nss-3.36.0-7.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824585" comment="nss-devel-3.36.0-7.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824586" comment="nss-pkcs11-devel-3.36.0-7.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824587" comment="nss-sysinit-3.36.0-7.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824588" comment="nss-tools-3.36.0-7.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:631" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2835.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2835.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12383">CVE-2018-12383 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12385">CVE-2018-12385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824589" comment="firefox-60.2.1-1.el7_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:632" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386/" source="CVE"/>
		<reference ref_id="CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2884.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2884.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12386">CVE-2018-12386 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12387">CVE-2018-12387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824590" comment="firefox-60.2.2-1.el7_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:633" version="1" class="patch">
	<metadata>
		<title>security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-15705" ref_url="https://www.suse.com/security/cve/CVE-2017-15705/" source="CVE"/>
		<reference ref_id="CVE-2018-11781" ref_url="https://www.suse.com/security/cve/CVE-2018-11781/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2916.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2916.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15705/">CVE-2017-15705 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15705">CVE-2017-15705 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11781/">CVE-2018-11781 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11781">CVE-2018-11781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824591" comment="spamassassin-3.4.0-4.el7_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:634" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2918.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2918.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10194">CVE-2018-10194 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15910">CVE-2018-15910 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16509">CVE-2018-16509 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16542">CVE-2018-16542 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824592" comment="ghostscript-9.07-29.el7_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824593" comment="ghostscript-cups-9.07-29.el7_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824594" comment="ghostscript-devel-9.07-29.el7_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824595" comment="ghostscript-doc-9.07-29.el7_5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824596" comment="ghostscript-gtk-9.07-29.el7_5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:635" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1336" ref_url="https://www.suse.com/security/cve/CVE-2018-1336/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2921.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2921.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1336/">CVE-2018-1336 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1336">CVE-2018-1336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824597" comment="tomcat-7.0.76-8.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824598" comment="tomcat-admin-webapps-7.0.76-8.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824599" comment="tomcat-docs-webapp-7.0.76-8.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824600" comment="tomcat-el-2.2-api-7.0.76-8.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824601" comment="tomcat-javadoc-7.0.76-8.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824602" comment="tomcat-jsp-2.2-api-7.0.76-8.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824603" comment="tomcat-jsvc-7.0.76-8.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824604" comment="tomcat-lib-7.0.76-8.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824605" comment="tomcat-servlet-3.0-api-7.0.76-8.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824606" comment="tomcat-webapps-7.0.76-8.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:636" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:2942.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:2942.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3183">CVE-2018-3183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3214">CVE-2018-3214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824607" comment="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824608" comment="java-1.8.0-openjdk-accessibility-1.8.0.191.b12-0.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824609" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.191.b12-0.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824610" comment="java-1.8.0-openjdk-debug-1.8.0.191.b12-0.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824611" comment="java-1.8.0-openjdk-demo-1.8.0.191.b12-0.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824612" comment="java-1.8.0-openjdk-demo-debug-1.8.0.191.b12-0.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824613" comment="java-1.8.0-openjdk-devel-1.8.0.191.b12-0.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824614" comment="java-1.8.0-openjdk-devel-debug-1.8.0.191.b12-0.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824615" comment="java-1.8.0-openjdk-headless-1.8.0.191.b12-0.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824616" comment="java-1.8.0-openjdk-headless-debug-1.8.0.191.b12-0.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824617" comment="java-1.8.0-openjdk-javadoc-1.8.0.191.b12-0.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824618" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.191.b12-0.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824619" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.191.b12-0.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824620" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.191.b12-0.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824621" comment="java-1.8.0-openjdk-src-1.8.0.191.b12-0.el7_5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824622" comment="java-1.8.0-openjdk-src-debug-1.8.0.191.b12-0.el7_5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:637" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395/" source="CVE"/>
		<reference ref_id="CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396/" source="CVE"/>
		<reference ref_id="CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3005.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3005.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12389">CVE-2018-12389 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12390">CVE-2018-12390 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12392">CVE-2018-12392 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12393">CVE-2018-12393 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12395">CVE-2018-12395 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12396">CVE-2018-12396 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12397">CVE-2018-12397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824623" comment="firefox-60.3.0-1.el7_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:638" version="1" class="patch">
	<metadata>
		<title>security update for binutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372/" source="CVE"/>
		<reference ref_id="CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373/" source="CVE"/>
		<reference ref_id="CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534/" source="CVE"/>
		<reference ref_id="CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535/" source="CVE"/>
		<reference ref_id="CVE-2018-13033" ref_url="https://www.suse.com/security/cve/CVE-2018-13033/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568/" source="CVE"/>
		<reference ref_id="CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569/" source="CVE"/>
		<reference ref_id="CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642/" source="CVE"/>
		<reference ref_id="CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643/" source="CVE"/>
		<reference ref_id="CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3032.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3032.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10372">CVE-2018-10372 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10373">CVE-2018-10373 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10534">CVE-2018-10534 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10535">CVE-2018-10535 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13033/">CVE-2018-13033 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13033">CVE-2018-13033 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7208">CVE-2018-7208 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7568">CVE-2018-7568 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7569">CVE-2018-7569 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7642">CVE-2018-7642 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7643">CVE-2018-7643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8945">CVE-2018-8945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824624" comment="binutils-2.27-34.base.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824625" comment="binutils-devel-2.27-34.base.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:639" version="1" class="patch">
	<metadata>
		<title>security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3041.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3041.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1060">CVE-2018-1060 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1061">CVE-2018-1061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824626" comment="python-2.7.5-76.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824627" comment="python-debug-2.7.5-76.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824628" comment="python-devel-2.7.5-76.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824629" comment="python-libs-2.7.5-76.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824630" comment="python-test-2.7.5-76.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824631" comment="python-tools-2.7.5-76.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824632" comment="tkinter-2.7.5-76.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:640" version="1" class="patch">
	<metadata>
		<title>security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844/" source="CVE"/>
		<reference ref_id="CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3050.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3050.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10844">CVE-2018-10844 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10845">CVE-2018-10845 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10846">CVE-2018-10846 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824633" comment="gnutls-3.3.29-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824634" comment="gnutls-c++-3.3.29-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824635" comment="gnutls-dane-3.3.29-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824636" comment="gnutls-devel-3.3.29-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824637" comment="gnutls-utils-3.3.29-8.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:641" version="1" class="patch">
	<metadata>
		<title>security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3052.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3052.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0494">CVE-2018-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824638" comment="wget-1.14-18.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:642" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="CVE-2018-1139" ref_url="https://www.suse.com/security/cve/CVE-2018-1139/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3056.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3056.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1050">CVE-2018-1050 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10858">CVE-2018-10858 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1139/">CVE-2018-1139 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1139">CVE-2018-1139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824639" comment="ctdb-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824640" comment="ctdb-tests-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824641" comment="libsmbclient-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824642" comment="libsmbclient-devel-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824643" comment="libwbclient-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824644" comment="libwbclient-devel-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824645" comment="samba-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824646" comment="samba-client-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824647" comment="samba-client-libs-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824648" comment="samba-common-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824649" comment="samba-common-libs-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824650" comment="samba-common-tools-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824651" comment="samba-dc-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824652" comment="samba-dc-libs-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824653" comment="samba-devel-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824654" comment="samba-krb5-printing-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824655" comment="samba-libs-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824656" comment="samba-pidl-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824657" comment="samba-python-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824658" comment="samba-python-test-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824659" comment="samba-test-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824660" comment="samba-test-libs-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824661" comment="samba-vfs-glusterfs-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824662" comment="samba-winbind-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824663" comment="samba-winbind-clients-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824664" comment="samba-winbind-krb5-locator-4.8.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824665" comment="samba-winbind-modules-4.8.3-4.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:643" version="1" class="patch">
	<metadata>
		<title>security update for freeglut (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2015-9262" ref_url="https://www.suse.com/security/cve/CVE-2015-9262/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3059.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3059.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-9262/">CVE-2015-9262 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9262">CVE-2015-9262 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824666" comment="drm-utils-2.4.91-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824667" comment="egl-utils-8.3.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824668" comment="freeglut-3.0.0-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824669" comment="freeglut-devel-3.0.0-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824670" comment="glx-utils-8.3.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824671" comment="intel-gpu-tools-2.99.917-28.20180530.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824672" comment="libX11-1.6.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824673" comment="libX11-common-1.6.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824674" comment="libX11-devel-1.6.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824675" comment="libXcursor-1.1.15-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824676" comment="libXcursor-devel-1.1.15-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824677" comment="libXfont-1.5.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824678" comment="libXfont-devel-1.5.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824679" comment="libXfont2-2.0.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824680" comment="libXfont2-devel-2.0.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824681" comment="libXres-1.2.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824682" comment="libXres-devel-1.2.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824683" comment="libdrm-2.4.91-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824684" comment="libdrm-devel-2.4.91-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824685" comment="libepoxy-1.5.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824686" comment="libepoxy-devel-1.5.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824687" comment="libglvnd-1.0.1-0.8.git5baa1e5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824688" comment="libglvnd-core-devel-1.0.1-0.8.git5baa1e5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824689" comment="libglvnd-devel-1.0.1-0.8.git5baa1e5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824690" comment="libglvnd-egl-1.0.1-0.8.git5baa1e5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824691" comment="libglvnd-gles-1.0.1-0.8.git5baa1e5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824692" comment="libglvnd-glx-1.0.1-0.8.git5baa1e5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824693" comment="libglvnd-opengl-1.0.1-0.8.git5baa1e5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824694" comment="libinput-1.10.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824695" comment="libinput-devel-1.10.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824696" comment="libwacom-0.30-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824697" comment="libwacom-data-0.30-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824698" comment="libwacom-devel-0.30-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824699" comment="libxcb-1.13-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824700" comment="libxcb-devel-1.13-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824701" comment="libxcb-doc-1.13-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824702" comment="mesa-demos-8.3.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824703" comment="mesa-dri-drivers-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824704" comment="mesa-filesystem-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824705" comment="mesa-libEGL-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824706" comment="mesa-libEGL-devel-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824707" comment="mesa-libGL-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824708" comment="mesa-libGL-devel-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824709" comment="mesa-libGLES-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824710" comment="mesa-libGLES-devel-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824711" comment="mesa-libOSMesa-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824712" comment="mesa-libOSMesa-devel-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824713" comment="mesa-libgbm-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824714" comment="mesa-libgbm-devel-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824715" comment="mesa-libglapi-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824716" comment="mesa-libwayland-egl-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824717" comment="mesa-libwayland-egl-devel-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824718" comment="mesa-libxatracker-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824719" comment="mesa-libxatracker-devel-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824720" comment="mesa-vdpau-drivers-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824721" comment="mesa-vulkan-drivers-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824722" comment="tigervnc-1.8.0-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824723" comment="tigervnc-icons-1.8.0-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824724" comment="tigervnc-license-1.8.0-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824725" comment="tigervnc-server-1.8.0-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824726" comment="tigervnc-server-applet-1.8.0-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824727" comment="tigervnc-server-minimal-1.8.0-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824728" comment="tigervnc-server-module-1.8.0-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824729" comment="vulkan-1.1.73.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824730" comment="vulkan-devel-1.1.73.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824731" comment="vulkan-filesystem-1.1.73.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824732" comment="xcb-proto-1.13-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824733" comment="xkeyboard-config-2.24-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824734" comment="xkeyboard-config-devel-2.24-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824735" comment="xorg-x11-drv-ati-18.0.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824736" comment="xorg-x11-drv-dummy-0.3.7-1.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824737" comment="xorg-x11-drv-evdev-2.10.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824738" comment="xorg-x11-drv-evdev-devel-2.10.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824739" comment="xorg-x11-drv-fbdev-0.5.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824740" comment="xorg-x11-drv-intel-2.99.917-28.20180530.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824741" comment="xorg-x11-drv-intel-devel-2.99.917-28.20180530.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824742" comment="xorg-x11-drv-libinput-0.27.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824743" comment="xorg-x11-drv-libinput-devel-0.27.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824744" comment="xorg-x11-drv-mouse-1.9.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824745" comment="xorg-x11-drv-mouse-devel-1.9.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824746" comment="xorg-x11-drv-nouveau-1.0.15-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824747" comment="xorg-x11-drv-openchrome-0.5.0-3.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824748" comment="xorg-x11-drv-openchrome-devel-0.5.0-3.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824749" comment="xorg-x11-drv-qxl-0.1.5-4.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824750" comment="xorg-x11-drv-synaptics-1.9.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824751" comment="xorg-x11-drv-synaptics-devel-1.9.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824752" comment="xorg-x11-drv-v4l-0.2.0-49.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824753" comment="xorg-x11-drv-vesa-2.4.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824754" comment="xorg-x11-drv-vmmouse-13.1.0-1.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824755" comment="xorg-x11-drv-vmware-13.2.1-1.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824756" comment="xorg-x11-drv-void-1.4.1-2.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824757" comment="xorg-x11-drv-wacom-0.36.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824758" comment="xorg-x11-drv-wacom-devel-0.36.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824759" comment="xorg-x11-font-utils-7.5-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824760" comment="xorg-x11-proto-devel-2018.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824761" comment="xorg-x11-server-Xdmx-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824762" comment="xorg-x11-server-Xephyr-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824763" comment="xorg-x11-server-Xnest-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824764" comment="xorg-x11-server-Xorg-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824765" comment="xorg-x11-server-Xspice-0.1.5-4.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824766" comment="xorg-x11-server-Xvfb-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824767" comment="xorg-x11-server-Xwayland-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824768" comment="xorg-x11-server-common-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824769" comment="xorg-x11-server-devel-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824770" comment="xorg-x11-server-source-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824771" comment="xorg-x11-utils-7.5-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824772" comment="xorg-x11-xkb-extras-7.7-14.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824773" comment="xorg-x11-xkb-utils-7.7-14.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824774" comment="xorg-x11-xkb-utils-devel-7.7-14.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824666" comment="drm-utils-2.4.91-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824667" comment="egl-utils-8.3.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824668" comment="freeglut-3.0.0-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824669" comment="freeglut-devel-3.0.0-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824670" comment="glx-utils-8.3.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824671" comment="intel-gpu-tools-2.99.917-28.20180530.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824672" comment="libX11-1.6.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824673" comment="libX11-common-1.6.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824674" comment="libX11-devel-1.6.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824675" comment="libXcursor-1.1.15-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824676" comment="libXcursor-devel-1.1.15-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824677" comment="libXfont-1.5.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824678" comment="libXfont-devel-1.5.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824679" comment="libXfont2-2.0.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824680" comment="libXfont2-devel-2.0.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824681" comment="libXres-1.2.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824682" comment="libXres-devel-1.2.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824683" comment="libdrm-2.4.91-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824684" comment="libdrm-devel-2.4.91-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824685" comment="libepoxy-1.5.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824686" comment="libepoxy-devel-1.5.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824687" comment="libglvnd-1.0.1-0.8.git5baa1e5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824688" comment="libglvnd-core-devel-1.0.1-0.8.git5baa1e5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824689" comment="libglvnd-devel-1.0.1-0.8.git5baa1e5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824690" comment="libglvnd-egl-1.0.1-0.8.git5baa1e5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824691" comment="libglvnd-gles-1.0.1-0.8.git5baa1e5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824692" comment="libglvnd-glx-1.0.1-0.8.git5baa1e5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824693" comment="libglvnd-opengl-1.0.1-0.8.git5baa1e5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824694" comment="libinput-1.10.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824695" comment="libinput-devel-1.10.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824696" comment="libwacom-0.30-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824697" comment="libwacom-data-0.30-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824698" comment="libwacom-devel-0.30-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824699" comment="libxcb-1.13-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824700" comment="libxcb-devel-1.13-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824701" comment="libxcb-doc-1.13-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824702" comment="mesa-demos-8.3.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824703" comment="mesa-dri-drivers-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824704" comment="mesa-filesystem-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824705" comment="mesa-libEGL-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824706" comment="mesa-libEGL-devel-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824707" comment="mesa-libGL-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824708" comment="mesa-libGL-devel-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824709" comment="mesa-libGLES-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824710" comment="mesa-libGLES-devel-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824711" comment="mesa-libOSMesa-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824712" comment="mesa-libOSMesa-devel-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824713" comment="mesa-libgbm-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824714" comment="mesa-libgbm-devel-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824715" comment="mesa-libglapi-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824716" comment="mesa-libwayland-egl-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824717" comment="mesa-libwayland-egl-devel-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824718" comment="mesa-libxatracker-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824719" comment="mesa-libxatracker-devel-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824720" comment="mesa-vdpau-drivers-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824721" comment="mesa-vulkan-drivers-18.0.5-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824722" comment="tigervnc-1.8.0-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824723" comment="tigervnc-icons-1.8.0-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824724" comment="tigervnc-license-1.8.0-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824725" comment="tigervnc-server-1.8.0-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824726" comment="tigervnc-server-applet-1.8.0-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824727" comment="tigervnc-server-minimal-1.8.0-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824728" comment="tigervnc-server-module-1.8.0-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824729" comment="vulkan-1.1.73.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824730" comment="vulkan-devel-1.1.73.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824731" comment="vulkan-filesystem-1.1.73.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824732" comment="xcb-proto-1.13-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824733" comment="xkeyboard-config-2.24-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824734" comment="xkeyboard-config-devel-2.24-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824735" comment="xorg-x11-drv-ati-18.0.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824736" comment="xorg-x11-drv-dummy-0.3.7-1.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824737" comment="xorg-x11-drv-evdev-2.10.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824738" comment="xorg-x11-drv-evdev-devel-2.10.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824739" comment="xorg-x11-drv-fbdev-0.5.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824740" comment="xorg-x11-drv-intel-2.99.917-28.20180530.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824741" comment="xorg-x11-drv-intel-devel-2.99.917-28.20180530.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824742" comment="xorg-x11-drv-libinput-0.27.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824743" comment="xorg-x11-drv-libinput-devel-0.27.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824744" comment="xorg-x11-drv-mouse-1.9.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824745" comment="xorg-x11-drv-mouse-devel-1.9.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824746" comment="xorg-x11-drv-nouveau-1.0.15-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824747" comment="xorg-x11-drv-openchrome-0.5.0-3.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824748" comment="xorg-x11-drv-openchrome-devel-0.5.0-3.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824749" comment="xorg-x11-drv-qxl-0.1.5-4.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824750" comment="xorg-x11-drv-synaptics-1.9.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824751" comment="xorg-x11-drv-synaptics-devel-1.9.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824752" comment="xorg-x11-drv-v4l-0.2.0-49.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824753" comment="xorg-x11-drv-vesa-2.4.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824754" comment="xorg-x11-drv-vmmouse-13.1.0-1.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824755" comment="xorg-x11-drv-vmware-13.2.1-1.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824756" comment="xorg-x11-drv-void-1.4.1-2.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824757" comment="xorg-x11-drv-wacom-0.36.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824758" comment="xorg-x11-drv-wacom-devel-0.36.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824759" comment="xorg-x11-font-utils-7.5-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824760" comment="xorg-x11-proto-devel-2018.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824761" comment="xorg-x11-server-Xdmx-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824762" comment="xorg-x11-server-Xephyr-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824763" comment="xorg-x11-server-Xnest-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824764" comment="xorg-x11-server-Xorg-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824765" comment="xorg-x11-server-Xspice-0.1.5-4.el7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824766" comment="xorg-x11-server-Xvfb-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824767" comment="xorg-x11-server-Xwayland-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824768" comment="xorg-x11-server-common-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824769" comment="xorg-x11-server-devel-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824770" comment="xorg-x11-server-source-1.20.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824771" comment="xorg-x11-utils-7.5-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824772" comment="xorg-x11-xkb-extras-7.7-14.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824773" comment="xorg-x11-xkb-utils-7.7-14.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824774" comment="xorg-x11-xkb-utils-devel-7.7-14.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:644" version="1" class="patch">
	<metadata>
		<title>security update for libkdcraw (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5800" ref_url="https://www.suse.com/security/cve/CVE-2018-5800/" source="CVE"/>
		<reference ref_id="CVE-2018-5801" ref_url="https://www.suse.com/security/cve/CVE-2018-5801/" source="CVE"/>
		<reference ref_id="CVE-2018-5802" ref_url="https://www.suse.com/security/cve/CVE-2018-5802/" source="CVE"/>
		<reference ref_id="CVE-2018-5805" ref_url="https://www.suse.com/security/cve/CVE-2018-5805/" source="CVE"/>
		<reference ref_id="CVE-2018-5806" ref_url="https://www.suse.com/security/cve/CVE-2018-5806/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3065.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3065.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5800/">CVE-2018-5800 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5800">CVE-2018-5800 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5801/">CVE-2018-5801 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5801">CVE-2018-5801 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5802/">CVE-2018-5802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5802">CVE-2018-5802 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5805/">CVE-2018-5805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5805">CVE-2018-5805 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5806/">CVE-2018-5806 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5806">CVE-2018-5806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824775" comment="libkdcraw-4.10.5-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824776" comment="libkdcraw-devel-4.10.5-5.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:645" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3071.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3071.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5729">CVE-2018-5729 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5730">CVE-2018-5730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824777" comment="krb5-devel-1.15.1-34.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824778" comment="krb5-libs-1.15.1-34.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824779" comment="krb5-pkinit-1.15.1-34.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824780" comment="krb5-server-1.15.1-34.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824781" comment="krb5-server-ldap-1.15.1-34.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824782" comment="krb5-workstation-1.15.1-34.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824783" comment="libkadm5-1.15.1-34.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:646" version="1" class="patch">
	<metadata>
		<title>security update for zsh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2014-10071" ref_url="https://www.suse.com/security/cve/CVE-2014-10071/" source="CVE"/>
		<reference ref_id="CVE-2014-10072" ref_url="https://www.suse.com/security/cve/CVE-2014-10072/" source="CVE"/>
		<reference ref_id="CVE-2017-18205" ref_url="https://www.suse.com/security/cve/CVE-2017-18205/" source="CVE"/>
		<reference ref_id="CVE-2017-18206" ref_url="https://www.suse.com/security/cve/CVE-2017-18206/" source="CVE"/>
		<reference ref_id="CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071/" source="CVE"/>
		<reference ref_id="CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083/" source="CVE"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<reference ref_id="CVE-2018-7549" ref_url="https://www.suse.com/security/cve/CVE-2018-7549/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3073.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3073.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10071/">CVE-2014-10071 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-10071">CVE-2014-10071 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10072/">CVE-2014-10072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-10072">CVE-2014-10072 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18205/">CVE-2017-18205 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18205">CVE-2017-18205 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18206/">CVE-2017-18206 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18206">CVE-2017-18206 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1071">CVE-2018-1071 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1083">CVE-2018-1083 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1100">CVE-2018-1100 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7549/">CVE-2018-7549 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7549">CVE-2018-7549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824784" comment="zsh-5.0.2-31.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824785" comment="zsh-html-5.0.2-31.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:647" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8830" ref_url="https://www.suse.com/security/cve/CVE-2015-8830/" source="CVE"/>
		<reference ref_id="CVE-2016-4913" ref_url="https://www.suse.com/security/cve/CVE-2016-4913/" source="CVE"/>
		<reference ref_id="CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861/" source="CVE"/>
		<reference ref_id="CVE-2017-10661" ref_url="https://www.suse.com/security/cve/CVE-2017-10661/" source="CVE"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2017-18232" ref_url="https://www.suse.com/security/cve/CVE-2017-18232/" source="CVE"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2018-1000026" ref_url="https://www.suse.com/security/cve/CVE-2018-1000026/" source="CVE"/>
		<reference ref_id="CVE-2018-10322" ref_url="https://www.suse.com/security/cve/CVE-2018-10322/" source="CVE"/>
		<reference ref_id="CVE-2018-10878" ref_url="https://www.suse.com/security/cve/CVE-2018-10878/" source="CVE"/>
		<reference ref_id="CVE-2018-10879" ref_url="https://www.suse.com/security/cve/CVE-2018-10879/" source="CVE"/>
		<reference ref_id="CVE-2018-10881" ref_url="https://www.suse.com/security/cve/CVE-2018-10881/" source="CVE"/>
		<reference ref_id="CVE-2018-10883" ref_url="https://www.suse.com/security/cve/CVE-2018-10883/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-1092" ref_url="https://www.suse.com/security/cve/CVE-2018-1092/" source="CVE"/>
		<reference ref_id="CVE-2018-1094" ref_url="https://www.suse.com/security/cve/CVE-2018-1094/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-1118" ref_url="https://www.suse.com/security/cve/CVE-2018-1118/" source="CVE"/>
		<reference ref_id="CVE-2018-1120" ref_url="https://www.suse.com/security/cve/CVE-2018-1120/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-5344" ref_url="https://www.suse.com/security/cve/CVE-2018-5344/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<reference ref_id="CVE-2018-7740" ref_url="https://www.suse.com/security/cve/CVE-2018-7740/" source="CVE"/>
		<reference ref_id="CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3083.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3083.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8830/">CVE-2015-8830 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8830">CVE-2015-8830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4913/">CVE-2016-4913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4913">CVE-2016-4913 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0861">CVE-2017-0861 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10661/">CVE-2017-10661 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10661">CVE-2017-10661 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17805">CVE-2017-17805 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18208">CVE-2017-18208 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18232/">CVE-2017-18232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18232">CVE-2017-18232 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18344">CVE-2017-18344 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000026/">CVE-2018-1000026 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000026">CVE-2018-1000026 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10322/">CVE-2018-10322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10322">CVE-2018-10322 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10878/">CVE-2018-10878 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10878">CVE-2018-10878 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10879/">CVE-2018-10879 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10879">CVE-2018-10879 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10881/">CVE-2018-10881 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10881">CVE-2018-10881 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10883/">CVE-2018-10883 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10883">CVE-2018-10883 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10902">CVE-2018-10902 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1092/">CVE-2018-1092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1092">CVE-2018-1092 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1094/">CVE-2018-1094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1094">CVE-2018-1094 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10940">CVE-2018-10940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1118/">CVE-2018-1118 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1118">CVE-2018-1118 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1120/">CVE-2018-1120 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1120">CVE-2018-1120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1130">CVE-2018-1130 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13405">CVE-2018-13405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5344/">CVE-2018-5344 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5344">CVE-2018-5344 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5391">CVE-2018-5391 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5803">CVE-2018-5803 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5848">CVE-2018-5848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7740/">CVE-2018-7740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7740">CVE-2018-7740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7757">CVE-2018-7757 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8781">CVE-2018-8781 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824786" comment="bpftool-3.10.0-957.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824787" comment="kernel-3.10.0-957.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824788" comment="kernel-abi-whitelists-3.10.0-957.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824789" comment="kernel-debug-3.10.0-957.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824792" comment="kernel-doc-3.10.0-957.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824793" comment="kernel-headers-3.10.0-957.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824794" comment="kernel-tools-3.10.0-957.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824795" comment="kernel-tools-libs-3.10.0-957.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824797" comment="perf-3.10.0-957.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824798" comment="python-perf-3.10.0-957.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:648" version="1" class="patch">
	<metadata>
		<title>security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3090.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3090.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824799" comment="OVMF-20180508-3.gitee3198e672e2.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:649" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3092.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3092.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16997">CVE-2017-16997 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11236">CVE-2018-11236 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11237">CVE-2018-11237 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6485">CVE-2018-6485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824800" comment="glibc-2.17-260.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824801" comment="glibc-common-2.17-260.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824802" comment="glibc-devel-2.17-260.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824803" comment="glibc-headers-2.17-260.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824804" comment="glibc-static-2.17-260.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824805" comment="glibc-utils-2.17-260.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824806" comment="nscd-2.17-260.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:650" version="1" class="patch">
	<metadata>
		<title>security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3107.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3107.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14526">CVE-2018-14526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824807" comment="wpa_supplicant-2.6-12.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:651" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-6764" ref_url="https://www.suse.com/security/cve/CVE-2018-6764/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3113.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3113.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6764/">CVE-2018-6764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6764">CVE-2018-6764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824808" comment="libvirt-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824809" comment="libvirt-admin-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824810" comment="libvirt-bash-completion-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824811" comment="libvirt-client-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824812" comment="libvirt-daemon-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824813" comment="libvirt-daemon-config-network-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824814" comment="libvirt-daemon-config-nwfilter-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824815" comment="libvirt-daemon-driver-interface-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824816" comment="libvirt-daemon-driver-lxc-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824817" comment="libvirt-daemon-driver-network-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824818" comment="libvirt-daemon-driver-nodedev-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824819" comment="libvirt-daemon-driver-nwfilter-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824820" comment="libvirt-daemon-driver-qemu-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824821" comment="libvirt-daemon-driver-secret-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824822" comment="libvirt-daemon-driver-storage-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824823" comment="libvirt-daemon-driver-storage-core-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824824" comment="libvirt-daemon-driver-storage-disk-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824825" comment="libvirt-daemon-driver-storage-gluster-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824826" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824827" comment="libvirt-daemon-driver-storage-logical-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824828" comment="libvirt-daemon-driver-storage-mpath-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824829" comment="libvirt-daemon-driver-storage-rbd-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824830" comment="libvirt-daemon-driver-storage-scsi-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824831" comment="libvirt-daemon-kvm-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824832" comment="libvirt-daemon-lxc-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824833" comment="libvirt-devel-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824834" comment="libvirt-docs-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824835" comment="libvirt-libs-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824836" comment="libvirt-lock-sanlock-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824837" comment="libvirt-login-shell-4.5.0-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824838" comment="libvirt-nss-4.5.0-10.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:652" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-14648" ref_url="https://www.suse.com/security/cve/CVE-2018-14648/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3127.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3127.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14648/">CVE-2018-14648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14648">CVE-2018-14648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824839" comment="389-ds-base-1.3.8.4-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824840" comment="389-ds-base-devel-1.3.8.4-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824841" comment="389-ds-base-libs-1.3.8.4-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824842" comment="389-ds-base-snmp-1.3.8.4-15.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:653" version="1" class="patch">
	<metadata>
		<title>security update for PackageKit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2015-9381" ref_url="https://www.suse.com/security/cve/CVE-2015-9381/" source="CVE"/>
		<reference ref_id="CVE-2015-9382" ref_url="https://www.suse.com/security/cve/CVE-2015-9382/" source="CVE"/>
		<reference ref_id="CVE-2017-18267" ref_url="https://www.suse.com/security/cve/CVE-2017-18267/" source="CVE"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2018-10733" ref_url="https://www.suse.com/security/cve/CVE-2018-10733/" source="CVE"/>
		<reference ref_id="CVE-2018-10767" ref_url="https://www.suse.com/security/cve/CVE-2018-10767/" source="CVE"/>
		<reference ref_id="CVE-2018-10768" ref_url="https://www.suse.com/security/cve/CVE-2018-10768/" source="CVE"/>
		<reference ref_id="CVE-2018-11712" ref_url="https://www.suse.com/security/cve/CVE-2018-11712/" source="CVE"/>
		<reference ref_id="CVE-2018-11713" ref_url="https://www.suse.com/security/cve/CVE-2018-11713/" source="CVE"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<reference ref_id="CVE-2018-13988" ref_url="https://www.suse.com/security/cve/CVE-2018-13988/" source="CVE"/>
		<reference ref_id="CVE-2018-14036" ref_url="https://www.suse.com/security/cve/CVE-2018-14036/" source="CVE"/>
		<reference ref_id="CVE-2018-4121" ref_url="https://www.suse.com/security/cve/CVE-2018-4121/" source="CVE"/>
		<reference ref_id="CVE-2018-4200" ref_url="https://www.suse.com/security/cve/CVE-2018-4200/" source="CVE"/>
		<reference ref_id="CVE-2018-4204" ref_url="https://www.suse.com/security/cve/CVE-2018-4204/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3140.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3140.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9381/">CVE-2015-9381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9381">CVE-2015-9381 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9382/">CVE-2015-9382 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9382">CVE-2015-9382 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18267/">CVE-2017-18267 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18267">CVE-2017-18267 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2862">CVE-2017-2862 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10733/">CVE-2018-10733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10733">CVE-2018-10733 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10767/">CVE-2018-10767 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10767">CVE-2018-10767 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10768/">CVE-2018-10768 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10768">CVE-2018-10768 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11712/">CVE-2018-11712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11712">CVE-2018-11712 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11713/">CVE-2018-11713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11713">CVE-2018-11713 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12910">CVE-2018-12910 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13988/">CVE-2018-13988 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13988">CVE-2018-13988 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14036/">CVE-2018-14036 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14036">CVE-2018-14036 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4121/">CVE-2018-4121 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4121">CVE-2018-4121 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4200/">CVE-2018-4200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4200">CVE-2018-4200 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4204/">CVE-2018-4204 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4204">CVE-2018-4204 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009824843" comment="PackageKit-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824844" comment="PackageKit-command-not-found-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824845" comment="PackageKit-cron-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824846" comment="PackageKit-glib-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824847" comment="PackageKit-glib-devel-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824848" comment="PackageKit-gstreamer-plugin-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824849" comment="PackageKit-gtk3-module-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824850" comment="PackageKit-yum-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824851" comment="PackageKit-yum-plugin-1.1.10-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824852" comment="accountsservice-0.6.50-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824853" comment="accountsservice-devel-0.6.50-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824854" comment="accountsservice-libs-0.6.50-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824855" comment="adwaita-cursor-theme-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824856" comment="adwaita-gtk2-theme-3.28-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824857" comment="adwaita-icon-theme-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824858" comment="adwaita-icon-theme-devel-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824859" comment="appstream-data-7-20180614.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824860" comment="at-spi2-atk-2.26.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824861" comment="at-spi2-atk-devel-2.26.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824862" comment="at-spi2-core-2.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824863" comment="at-spi2-core-devel-2.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824864" comment="atk-2.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824865" comment="atk-devel-2.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824866" comment="baobab-3.28.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824867" comment="bolt-0.4-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824868" comment="brasero-3.12.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824869" comment="brasero-devel-3.12.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824870" comment="brasero-libs-3.12.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824871" comment="brasero-nautilus-3.12.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824872" comment="cairo-1.15.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824873" comment="cairo-devel-1.15.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824874" comment="cairo-gobject-1.15.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824875" comment="cairo-gobject-devel-1.15.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824876" comment="cairo-tools-1.15.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824877" comment="cheese-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824878" comment="cheese-libs-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824879" comment="cheese-libs-devel-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824880" comment="clutter-gst3-3.0.26-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824881" comment="clutter-gst3-devel-3.0.26-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824882" comment="compat-exiv2-023-0.23-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824883" comment="compat-libical1-1.0.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824884" comment="control-center-3.28.1-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824885" comment="control-center-filesystem-3.28.1-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824886" comment="dconf-0.28.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824887" comment="dconf-devel-0.28.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824888" comment="dconf-editor-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824889" comment="devhelp-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824890" comment="devhelp-devel-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824891" comment="devhelp-libs-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824892" comment="ekiga-4.0.1-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824893" comment="empathy-3.12.13-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824894" comment="eog-3.28.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824895" comment="eog-devel-3.28.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824896" comment="evince-3.28.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824897" comment="evince-browser-plugin-3.28.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824898" comment="evince-devel-3.28.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824899" comment="evince-dvi-3.28.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824900" comment="evince-libs-3.28.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824901" comment="evince-nautilus-3.28.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824902" comment="evolution-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824903" comment="evolution-bogofilter-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824904" comment="evolution-data-server-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824905" comment="evolution-data-server-devel-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824906" comment="evolution-data-server-doc-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824907" comment="evolution-data-server-langpacks-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824908" comment="evolution-data-server-perl-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824909" comment="evolution-data-server-tests-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824910" comment="evolution-devel-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824911" comment="evolution-devel-docs-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824912" comment="evolution-ews-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824913" comment="evolution-ews-langpacks-3.28.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824914" comment="evolution-help-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824915" comment="evolution-langpacks-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824916" comment="evolution-mapi-3.28.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824917" comment="evolution-mapi-langpacks-3.28.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824918" comment="evolution-pst-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824919" comment="evolution-spamassassin-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824920" comment="evolution-tests-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824921" comment="file-roller-3.28.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824922" comment="file-roller-nautilus-3.28.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824923" comment="flatpak-1.0.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824924" comment="flatpak-builder-1.0.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824925" comment="flatpak-devel-1.0.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824926" comment="flatpak-libs-1.0.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824927" comment="folks-0.11.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824928" comment="folks-devel-0.11.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824929" comment="folks-tools-0.11.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824930" comment="fontconfig-2.13.0-4.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824931" comment="fontconfig-devel-2.13.0-4.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824932" comment="fontconfig-devel-doc-2.13.0-4.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824933" comment="freetype-2.8-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824934" comment="freetype-demos-2.8-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824935" comment="freetype-devel-2.8-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824936" comment="fribidi-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824937" comment="fribidi-devel-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824938" comment="fwupd-1.0.8-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824939" comment="fwupd-devel-1.0.8-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824940" comment="fwupdate-12-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824941" comment="fwupdate-devel-12-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824942" comment="fwupdate-efi-12-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824943" comment="fwupdate-libs-12-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824944" comment="gcr-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824945" comment="gcr-devel-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824946" comment="gdk-pixbuf2-2.36.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824947" comment="gdk-pixbuf2-devel-2.36.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824948" comment="gdk-pixbuf2-tests-2.36.12-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824949" comment="gdm-3.28.2-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824950" comment="gdm-devel-3.28.2-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824951" comment="gdm-pam-extensions-devel-3.28.2-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824952" comment="gedit-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824953" comment="gedit-devel-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824954" comment="gedit-plugin-bookmarks-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824955" comment="gedit-plugin-bracketcompletion-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824956" comment="gedit-plugin-charmap-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824957" comment="gedit-plugin-codecomment-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824958" comment="gedit-plugin-colorpicker-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824959" comment="gedit-plugin-colorschemer-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824960" comment="gedit-plugin-commander-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824961" comment="gedit-plugin-drawspaces-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824962" comment="gedit-plugin-findinfiles-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824963" comment="gedit-plugin-joinlines-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824964" comment="gedit-plugin-multiedit-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824965" comment="gedit-plugin-smartspaces-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824966" comment="gedit-plugin-synctex-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824967" comment="gedit-plugin-terminal-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824968" comment="gedit-plugin-textsize-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824969" comment="gedit-plugin-translate-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824970" comment="gedit-plugin-wordcompletion-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824971" comment="gedit-plugins-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824972" comment="gedit-plugins-data-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824973" comment="geoclue2-2.4.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824974" comment="geoclue2-demos-2.4.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824975" comment="geoclue2-devel-2.4.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824976" comment="geoclue2-libs-2.4.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824977" comment="geocode-glib-3.26.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824978" comment="geocode-glib-devel-3.26.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824979" comment="gjs-1.52.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824980" comment="gjs-devel-1.52.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824981" comment="gjs-tests-1.52.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824982" comment="glade-3.22.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824983" comment="glade-devel-3.22.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824984" comment="glade-libs-3.22.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824985" comment="glib-networking-2.56.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824986" comment="glib-networking-tests-2.56.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824987" comment="glib2-2.56.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824988" comment="glib2-devel-2.56.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824989" comment="glib2-doc-2.56.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824990" comment="glib2-fam-2.56.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824991" comment="glib2-static-2.56.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824992" comment="glib2-tests-2.56.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824993" comment="glibmm24-2.56.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824994" comment="glibmm24-devel-2.56.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824995" comment="glibmm24-doc-2.56.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824996" comment="gnome-backgrounds-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824997" comment="gnome-bluetooth-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824998" comment="gnome-bluetooth-libs-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009824999" comment="gnome-bluetooth-libs-devel-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825000" comment="gnome-boxes-3.28.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825001" comment="gnome-calculator-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825002" comment="gnome-classic-session-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825003" comment="gnome-clocks-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825004" comment="gnome-color-manager-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825005" comment="gnome-contacts-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825006" comment="gnome-desktop3-3.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825007" comment="gnome-desktop3-devel-3.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825008" comment="gnome-desktop3-tests-3.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825009" comment="gnome-devel-docs-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825010" comment="gnome-dictionary-3.26.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825011" comment="gnome-disk-utility-3.28.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825012" comment="gnome-documents-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825013" comment="gnome-documents-libs-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825014" comment="gnome-font-viewer-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825015" comment="gnome-getting-started-docs-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825016" comment="gnome-getting-started-docs-cs-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825017" comment="gnome-getting-started-docs-de-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825018" comment="gnome-getting-started-docs-es-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825019" comment="gnome-getting-started-docs-fr-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825020" comment="gnome-getting-started-docs-gl-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825021" comment="gnome-getting-started-docs-hu-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825022" comment="gnome-getting-started-docs-it-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825023" comment="gnome-getting-started-docs-pl-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825024" comment="gnome-getting-started-docs-pt_BR-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825025" comment="gnome-getting-started-docs-ru-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825026" comment="gnome-initial-setup-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825027" comment="gnome-keyring-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825028" comment="gnome-keyring-pam-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825029" comment="gnome-online-accounts-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825030" comment="gnome-online-accounts-devel-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825031" comment="gnome-online-miners-3.26.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825032" comment="gnome-packagekit-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825033" comment="gnome-packagekit-common-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825034" comment="gnome-packagekit-installer-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825035" comment="gnome-packagekit-updater-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825036" comment="gnome-screenshot-3.26.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825037" comment="gnome-session-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825038" comment="gnome-session-custom-session-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825039" comment="gnome-session-wayland-session-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825040" comment="gnome-session-xsession-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825041" comment="gnome-settings-daemon-3.28.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825042" comment="gnome-settings-daemon-devel-3.28.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825043" comment="gnome-shell-3.28.3-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825044" comment="gnome-shell-extension-alternate-tab-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825045" comment="gnome-shell-extension-apps-menu-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825046" comment="gnome-shell-extension-auto-move-windows-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825047" comment="gnome-shell-extension-common-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825048" comment="gnome-shell-extension-dash-to-dock-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825049" comment="gnome-shell-extension-drive-menu-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825050" comment="gnome-shell-extension-launch-new-instance-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825051" comment="gnome-shell-extension-native-window-placement-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825052" comment="gnome-shell-extension-no-hot-corner-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825053" comment="gnome-shell-extension-panel-favorites-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825054" comment="gnome-shell-extension-places-menu-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825055" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825056" comment="gnome-shell-extension-systemMonitor-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825057" comment="gnome-shell-extension-top-icons-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825058" comment="gnome-shell-extension-updates-dialog-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825059" comment="gnome-shell-extension-user-theme-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825060" comment="gnome-shell-extension-window-list-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825061" comment="gnome-shell-extension-windowsNavigator-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825062" comment="gnome-shell-extension-workspace-indicator-3.28.1-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825063" comment="gnome-software-3.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825064" comment="gnome-software-devel-3.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825065" comment="gnome-software-editor-3.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825066" comment="gnome-system-monitor-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825067" comment="gnome-terminal-3.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825068" comment="gnome-terminal-nautilus-3.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825069" comment="gnome-themes-standard-3.28-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825070" comment="gnome-tweak-tool-3.28.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825071" comment="gnome-user-docs-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825072" comment="gnote-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825073" comment="gobject-introspection-1.56.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825074" comment="gobject-introspection-devel-1.56.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825075" comment="gom-0.3.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825076" comment="gom-devel-0.3.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825077" comment="google-noto-emoji-color-fonts-20180508-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825078" comment="google-noto-emoji-fonts-20180508-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825079" comment="grilo-0.3.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825080" comment="grilo-devel-0.3.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825081" comment="grilo-plugins-0.3.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825082" comment="gsettings-desktop-schemas-3.28.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825083" comment="gsettings-desktop-schemas-devel-3.28.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825084" comment="gspell-1.6.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825085" comment="gspell-devel-1.6.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825086" comment="gspell-doc-1.6.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825087" comment="gssdp-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825088" comment="gssdp-devel-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825089" comment="gssdp-docs-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825090" comment="gssdp-utils-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825091" comment="gstreamer1-plugins-base-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825092" comment="gstreamer1-plugins-base-devel-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825093" comment="gstreamer1-plugins-base-devel-docs-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825094" comment="gstreamer1-plugins-base-tools-1.10.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825095" comment="gtk-doc-1.28-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825096" comment="gtk-update-icon-cache-3.22.30-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825097" comment="gtk3-3.22.30-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825098" comment="gtk3-devel-3.22.30-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825099" comment="gtk3-devel-docs-3.22.30-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825100" comment="gtk3-immodule-xim-3.22.30-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825101" comment="gtk3-immodules-3.22.30-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825102" comment="gtk3-tests-3.22.30-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825103" comment="gtksourceview3-3.24.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825104" comment="gtksourceview3-devel-3.24.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825105" comment="gtksourceview3-tests-3.24.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825106" comment="gucharmap-10.0.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825107" comment="gucharmap-devel-10.0.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825108" comment="gucharmap-libs-10.0.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825109" comment="gupnp-1.0.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825110" comment="gupnp-devel-1.0.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825111" comment="gupnp-docs-1.0.2-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825112" comment="gupnp-igd-0.2.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825113" comment="gupnp-igd-devel-0.2.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825114" comment="gupnp-igd-python-0.2.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825115" comment="gvfs-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825116" comment="gvfs-afc-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825117" comment="gvfs-afp-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825118" comment="gvfs-archive-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825119" comment="gvfs-client-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825120" comment="gvfs-devel-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825121" comment="gvfs-fuse-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825122" comment="gvfs-goa-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825123" comment="gvfs-gphoto2-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825124" comment="gvfs-mtp-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825125" comment="gvfs-smb-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825126" comment="gvfs-tests-1.36.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825127" comment="harfbuzz-1.7.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825128" comment="harfbuzz-devel-1.7.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825129" comment="harfbuzz-icu-1.7.5-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825130" comment="json-glib-1.4.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825131" comment="json-glib-devel-1.4.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825132" comment="json-glib-tests-1.4.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825133" comment="libappstream-glib-0.7.8-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825134" comment="libappstream-glib-builder-0.7.8-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825135" comment="libappstream-glib-builder-devel-0.7.8-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825136" comment="libappstream-glib-devel-0.7.8-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825137" comment="libchamplain-0.12.16-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825138" comment="libchamplain-demos-0.12.16-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825139" comment="libchamplain-devel-0.12.16-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825140" comment="libchamplain-gtk-0.12.16-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825141" comment="libcroco-0.6.12-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825142" comment="libcroco-devel-0.6.12-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825143" comment="libgdata-0.17.9-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825144" comment="libgdata-devel-0.17.9-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825145" comment="libgee-0.20.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825146" comment="libgee-devel-0.20.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825147" comment="libgepub-0.6.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825148" comment="libgepub-devel-0.6.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825149" comment="libgexiv2-0.10.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825150" comment="libgexiv2-devel-0.10.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825151" comment="libgnomekbd-3.26.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825152" comment="libgnomekbd-devel-3.26.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825153" comment="libgovirt-0.3.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825154" comment="libgovirt-devel-0.3.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825155" comment="libgtop2-2.38.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825156" comment="libgtop2-devel-2.38.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825157" comment="libgweather-3.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825158" comment="libgweather-devel-3.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825159" comment="libgxps-0.3.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825160" comment="libgxps-devel-0.3.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825161" comment="libgxps-tools-0.3.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825162" comment="libical-3.0.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825163" comment="libical-devel-3.0.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825164" comment="libical-glib-3.0.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825165" comment="libical-glib-devel-3.0.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825166" comment="libical-glib-doc-3.0.3-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825167" comment="libjpeg-turbo-1.2.90-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825168" comment="libjpeg-turbo-devel-1.2.90-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825169" comment="libjpeg-turbo-static-1.2.90-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825170" comment="libjpeg-turbo-utils-1.2.90-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825171" comment="libmediaart-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825172" comment="libmediaart-devel-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825173" comment="libmediaart-tests-1.9.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825174" comment="libosinfo-1.1.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825175" comment="libosinfo-devel-1.1.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825176" comment="libosinfo-vala-1.1.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825177" comment="libpeas-1.22.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825178" comment="libpeas-devel-1.22.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825179" comment="libpeas-gtk-1.22.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825180" comment="libpeas-loader-python-1.22.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825181" comment="librsvg2-2.40.20-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825182" comment="librsvg2-devel-2.40.20-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825183" comment="librsvg2-tools-2.40.20-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825184" comment="libsecret-0.18.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825185" comment="libsecret-devel-0.18.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825186" comment="libsoup-2.62.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825187" comment="libsoup-devel-2.62.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825188" comment="libwayland-client-1.15.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825189" comment="libwayland-cursor-1.15.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825190" comment="libwayland-egl-1.15.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825191" comment="libwayland-server-1.15.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825192" comment="libwnck3-3.24.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825193" comment="libwnck3-devel-3.24.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825194" comment="mozjs52-52.9.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825195" comment="mozjs52-devel-52.9.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825196" comment="mutter-3.28.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825197" comment="mutter-devel-3.28.3-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825198" comment="nautilus-3.26.3.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825199" comment="nautilus-devel-3.26.3.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825200" comment="nautilus-extensions-3.26.3.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825201" comment="nautilus-sendto-3.8.6-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825202" comment="openchange-2.3-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825203" comment="openchange-client-2.3-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825204" comment="openchange-devel-2.3-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825205" comment="openchange-devel-docs-2.3-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825206" comment="osinfo-db-20180531-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825207" comment="pango-1.42.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825208" comment="pango-devel-1.42.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825209" comment="pango-tests-1.42.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825210" comment="poppler-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825211" comment="poppler-cpp-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825212" comment="poppler-cpp-devel-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825213" comment="poppler-demos-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825214" comment="poppler-devel-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825215" comment="poppler-glib-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825216" comment="poppler-glib-devel-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825217" comment="poppler-qt-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825218" comment="poppler-qt-devel-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825219" comment="poppler-utils-0.26.5-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825220" comment="python2-gexiv2-0.10.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825221" comment="python2-pyatspi-2.26.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825222" comment="rest-0.8.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825223" comment="rest-devel-0.8.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825224" comment="rhythmbox-3.4.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825225" comment="rhythmbox-devel-3.4.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825226" comment="seahorse-nautilus-3.11.92-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825227" comment="shotwell-0.28.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825228" comment="sushi-3.28.3-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825229" comment="totem-3.26.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825230" comment="totem-devel-3.26.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825231" comment="totem-nautilus-3.26.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825232" comment="totem-pl-parser-3.26.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825233" comment="totem-pl-parser-devel-3.26.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825234" comment="turbojpeg-1.2.90-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825235" comment="turbojpeg-devel-1.2.90-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825236" comment="upower-0.99.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825237" comment="upower-devel-0.99.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825238" comment="upower-devel-docs-0.99.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825239" comment="vala-0.40.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825240" comment="vala-devel-0.40.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825241" comment="vala-doc-0.40.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825242" comment="valadoc-0.40.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825243" comment="valadoc-devel-0.40.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825244" comment="vino-3.22.0-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825245" comment="vte-profile-0.52.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825246" comment="vte291-0.52.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825247" comment="vte291-devel-0.52.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825248" comment="wayland-devel-1.15.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825249" comment="wayland-doc-1.15.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825250" comment="wayland-protocols-devel-1.14-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825251" comment="webkitgtk4-2.20.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825252" comment="webkitgtk4-devel-2.20.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825253" comment="webkitgtk4-doc-2.20.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825254" comment="webkitgtk4-jsc-2.20.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825255" comment="webkitgtk4-jsc-devel-2.20.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825256" comment="webkitgtk4-plugin-process-gtk2-2.20.5-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825257" comment="xdg-desktop-portal-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825258" comment="xdg-desktop-portal-devel-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825259" comment="xdg-desktop-portal-gtk-1.0.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825260" comment="yelp-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825261" comment="yelp-devel-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825262" comment="yelp-libs-3.28.1-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825263" comment="yelp-tools-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825264" comment="yelp-xsl-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825265" comment="yelp-xsl-devel-3.28.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825266" comment="zenity-3.28.1-1.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:654" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3157.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3157.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000007">CVE-2018-1000007 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000120">CVE-2018-1000120 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000121">CVE-2018-1000121 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000122">CVE-2018-1000122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000301">CVE-2018-1000301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825267" comment="curl-7.29.0-51.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825268" comment="libcurl-7.29.0-51.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825269" comment="libcurl-devel-7.29.0-51.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825270" comment="nss-pem-1.0.3-5.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:655" version="1" class="patch">
	<metadata>
		<title>security update for sssd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-10852" ref_url="https://www.suse.com/security/cve/CVE-2018-10852/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3158.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3158.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10852/">CVE-2018-10852 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10852">CVE-2018-10852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825271" comment="libipa_hbac-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825272" comment="libipa_hbac-devel-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825273" comment="libsss_autofs-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825274" comment="libsss_certmap-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825275" comment="libsss_certmap-devel-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825276" comment="libsss_idmap-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825277" comment="libsss_idmap-devel-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825278" comment="libsss_nss_idmap-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825279" comment="libsss_nss_idmap-devel-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825280" comment="libsss_simpleifp-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825281" comment="libsss_simpleifp-devel-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825282" comment="libsss_sudo-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825283" comment="python-libipa_hbac-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825284" comment="python-libsss_nss_idmap-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825285" comment="python-sss-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825286" comment="python-sss-murmur-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825287" comment="python-sssdconfig-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825288" comment="sssd-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825289" comment="sssd-ad-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825290" comment="sssd-client-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825291" comment="sssd-common-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825292" comment="sssd-common-pac-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825293" comment="sssd-dbus-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825294" comment="sssd-ipa-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825295" comment="sssd-kcm-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825296" comment="sssd-krb5-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825297" comment="sssd-krb5-common-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825298" comment="sssd-ldap-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825299" comment="sssd-libwbclient-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825300" comment="sssd-libwbclient-devel-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825301" comment="sssd-polkit-rules-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825302" comment="sssd-proxy-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825303" comment="sssd-tools-1.16.2-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825304" comment="sssd-winbind-idmap-1.16.2-13.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:656" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3221.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3221.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3735">CVE-2017-3735 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0737">CVE-2018-0737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825305" comment="openssl-1.0.2k-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825306" comment="openssl-devel-1.0.2k-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825307" comment="openssl-libs-1.0.2k-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825308" comment="openssl-perl-1.0.2k-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825309" comment="openssl-static-1.0.2k-16.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:657" version="1" class="patch">
	<metadata>
		<title>security update for zziplib (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-7725" ref_url="https://www.suse.com/security/cve/CVE-2018-7725/" source="CVE"/>
		<reference ref_id="CVE-2018-7726" ref_url="https://www.suse.com/security/cve/CVE-2018-7726/" source="CVE"/>
		<reference ref_id="CVE-2018-7727" ref_url="https://www.suse.com/security/cve/CVE-2018-7727/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3229.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3229.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7725/">CVE-2018-7725 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7725">CVE-2018-7725 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7726/">CVE-2018-7726 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7726">CVE-2018-7726 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7727/">CVE-2018-7727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7727">CVE-2018-7727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825310" comment="zziplib-0.13.62-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825311" comment="zziplib-devel-0.13.62-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825312" comment="zziplib-utils-0.13.62-9.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:658" version="1" class="patch">
	<metadata>
		<title>security update for glusterfs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-10911" ref_url="https://www.suse.com/security/cve/CVE-2018-10911/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3242.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3242.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10911/">CVE-2018-10911 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10911">CVE-2018-10911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825313" comment="glusterfs-3.12.2-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825314" comment="glusterfs-api-3.12.2-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825315" comment="glusterfs-api-devel-3.12.2-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825316" comment="glusterfs-cli-3.12.2-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825317" comment="glusterfs-client-xlators-3.12.2-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825318" comment="glusterfs-devel-3.12.2-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825319" comment="glusterfs-fuse-3.12.2-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825320" comment="glusterfs-libs-3.12.2-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825321" comment="glusterfs-rdma-3.12.2-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825322" comment="python2-gluster-3.12.2-18.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:659" version="1" class="patch">
	<metadata>
		<title>security update for libcdio (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-18198" ref_url="https://www.suse.com/security/cve/CVE-2017-18198/" source="CVE"/>
		<reference ref_id="CVE-2017-18199" ref_url="https://www.suse.com/security/cve/CVE-2017-18199/" source="CVE"/>
		<reference ref_id="CVE-2017-18201" ref_url="https://www.suse.com/security/cve/CVE-2017-18201/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3246.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3246.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18198/">CVE-2017-18198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18198">CVE-2017-18198 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18199/">CVE-2017-18199 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18199">CVE-2017-18199 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18201/">CVE-2017-18201 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18201">CVE-2017-18201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825323" comment="libcdio-0.92-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825324" comment="libcdio-devel-0.92-3.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825323" comment="libcdio-0.92-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825324" comment="libcdio-devel-0.92-3.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:660" version="1" class="patch">
	<metadata>
		<title>security update for setup (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1113" ref_url="https://www.suse.com/security/cve/CVE-2018-1113/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3249.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3249.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1113/">CVE-2018-1113 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1113">CVE-2018-1113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825325" comment="setup-2.8.71-10.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:661" version="1" class="patch">
	<metadata>
		<title>security update for jasper (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-9396" ref_url="https://www.suse.com/security/cve/CVE-2016-9396/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3253.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3253.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9396/">CVE-2016-9396 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9396">CVE-2016-9396 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000050">CVE-2017-1000050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825326" comment="jasper-1.900.1-33.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825327" comment="jasper-devel-1.900.1-33.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825328" comment="jasper-libs-1.900.1-33.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825329" comment="jasper-utils-1.900.1-33.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825326" comment="jasper-1.900.1-33.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825327" comment="jasper-devel-1.900.1-33.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825328" comment="jasper-libs-1.900.1-33.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825329" comment="jasper-utils-1.900.1-33.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:662" version="1" class="patch">
	<metadata>
		<title>security update for fuse (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3324.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3324.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10906">CVE-2018-10906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825330" comment="fuse-2.9.2-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825331" comment="fuse-devel-2.9.2-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825332" comment="fuse-libs-2.9.2-11.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825330" comment="fuse-2.9.2-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825331" comment="fuse-devel-2.9.2-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825332" comment="fuse-libs-2.9.2-11.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:663" version="1" class="patch">
	<metadata>
		<title>security update for libmspack (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3327.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3327.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14680">CVE-2018-14680 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14681">CVE-2018-14681 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14682">CVE-2018-14682 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825333" comment="libmspack-0.5-0.6.alpha.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825334" comment="libmspack-devel-0.5-0.6.alpha.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:664" version="1" class="patch">
	<metadata>
		<title>security update for xerces-c (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-4463" ref_url="https://www.suse.com/security/cve/CVE-2016-4463/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3335.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3335.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4463/">CVE-2016-4463 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4463">CVE-2016-4463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825335" comment="xerces-c-3.1.1-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825336" comment="xerces-c-devel-3.1.1-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825337" comment="xerces-c-doc-3.1.1-9.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:665" version="1" class="patch">
	<metadata>
		<title>security update for python-paramiko (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-1000805" ref_url="https://www.suse.com/security/cve/CVE-2018-1000805/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3347.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3347.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000805/">CVE-2018-1000805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000805">CVE-2018-1000805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825338" comment="python-paramiko-2.1.1-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825339" comment="python-paramiko-doc-2.1.1-9.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825338" comment="python-paramiko-2.1.1-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825339" comment="python-paramiko-doc-2.1.1-9.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:666" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3350.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3350.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3214">CVE-2018-3214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825340" comment="java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825341" comment="java-1.7.0-openjdk-accessibility-1.7.0.201-2.6.16.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825342" comment="java-1.7.0-openjdk-demo-1.7.0.201-2.6.16.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825343" comment="java-1.7.0-openjdk-devel-1.7.0.201-2.6.16.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825344" comment="java-1.7.0-openjdk-headless-1.7.0.201-2.6.16.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825345" comment="java-1.7.0-openjdk-javadoc-1.7.0.201-2.6.16.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825346" comment="java-1.7.0-openjdk-src-1.7.0.201-2.6.16.1.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:667" version="1" class="patch">
	<metadata>
		<title>security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3408.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3408.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17456">CVE-2018-17456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825347" comment="emacs-git-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825348" comment="emacs-git-el-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825349" comment="git-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825350" comment="git-all-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825351" comment="git-bzr-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825352" comment="git-cvs-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825353" comment="git-daemon-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825354" comment="git-email-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825355" comment="git-gnome-keyring-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825356" comment="git-gui-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825357" comment="git-hg-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825358" comment="git-instaweb-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825359" comment="git-p4-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825360" comment="git-svn-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825361" comment="gitk-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825362" comment="gitweb-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825363" comment="perl-Git-1.8.3.1-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825364" comment="perl-Git-SVN-1.8.3.1-20.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:668" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3410.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3410.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14665">CVE-2018-14665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825365" comment="xorg-x11-server-Xdmx-1.20.1-5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825366" comment="xorg-x11-server-Xephyr-1.20.1-5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825367" comment="xorg-x11-server-Xnest-1.20.1-5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825368" comment="xorg-x11-server-Xorg-1.20.1-5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825369" comment="xorg-x11-server-Xvfb-1.20.1-5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825370" comment="xorg-x11-server-Xwayland-1.20.1-5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825371" comment="xorg-x11-server-common-1.20.1-5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825372" comment="xorg-x11-server-devel-1.20.1-5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825373" comment="xorg-x11-server-source-1.20.1-5.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:669" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3458.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3458.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16541">CVE-2017-16541 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12376">CVE-2018-12376 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12377">CVE-2018-12377 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12378">CVE-2018-12378 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12379">CVE-2018-12379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12383">CVE-2018-12383 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12385">CVE-2018-12385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825374" comment="thunderbird-60.2.1-4.el7_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:670" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3150" ref_url="https://www.suse.com/security/cve/CVE-2018-3150/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3521.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3521.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3136">CVE-2018-3136 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3139">CVE-2018-3139 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3149">CVE-2018-3149 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3150/">CVE-2018-3150 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3150">CVE-2018-3150 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3169">CVE-2018-3169 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3180">CVE-2018-3180 at NVD</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3183">CVE-2018-3183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825375" comment="java-11-openjdk-11.0.1.13-3.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825376" comment="java-11-openjdk-debug-11.0.1.13-3.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825377" comment="java-11-openjdk-demo-11.0.1.13-3.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825378" comment="java-11-openjdk-demo-debug-11.0.1.13-3.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825379" comment="java-11-openjdk-devel-11.0.1.13-3.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825380" comment="java-11-openjdk-devel-debug-11.0.1.13-3.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825381" comment="java-11-openjdk-headless-11.0.1.13-3.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825382" comment="java-11-openjdk-headless-debug-11.0.1.13-3.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825383" comment="java-11-openjdk-javadoc-11.0.1.13-3.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825384" comment="java-11-openjdk-javadoc-debug-11.0.1.13-3.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825385" comment="java-11-openjdk-javadoc-zip-11.0.1.13-3.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825386" comment="java-11-openjdk-javadoc-zip-debug-11.0.1.13-3.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825387" comment="java-11-openjdk-jmods-11.0.1.13-3.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825388" comment="java-11-openjdk-jmods-debug-11.0.1.13-3.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825389" comment="java-11-openjdk-src-11.0.1.13-3.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825390" comment="java-11-openjdk-src-debug-11.0.1.13-3.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:671" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3532.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3532.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12389">CVE-2018-12389 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12390">CVE-2018-12390 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12392">CVE-2018-12392 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12393">CVE-2018-12393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825391" comment="thunderbird-60.3.0-1.el7_5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:672" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3650.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3650.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15908">CVE-2018-15908 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15909">CVE-2018-15909 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16511">CVE-2018-16511 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16539">CVE-2018-16539 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825392" comment="ghostscript-9.07-31.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825393" comment="ghostscript-cups-9.07-31.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825394" comment="ghostscript-devel-9.07-31.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825395" comment="ghostscript-doc-9.07-31.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825396" comment="ghostscript-gtk-9.07-31.el7_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:673" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-14646" ref_url="https://www.suse.com/security/cve/CVE-2018-14646/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3651.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3651.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14633">CVE-2018-14633 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14646/">CVE-2018-14646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14646">CVE-2018-14646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825397" comment="bpftool-3.10.0-957.1.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825398" comment="kernel-3.10.0-957.1.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825399" comment="kernel-abi-whitelists-3.10.0-957.1.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825400" comment="kernel-debug-3.10.0-957.1.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825403" comment="kernel-doc-3.10.0-957.1.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825404" comment="kernel-headers-3.10.0-957.1.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825405" comment="kernel-tools-3.10.0-957.1.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825406" comment="kernel-tools-libs-3.10.0-957.1.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825408" comment="perf-3.10.0-957.1.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825409" comment="python-perf-3.10.0-957.1.3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:674" version="1" class="patch">
	<metadata>
		<title>security update for sos-collector (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-14650" ref_url="https://www.suse.com/security/cve/CVE-2018-14650/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3663.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3663.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14650/">CVE-2018-14650 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14650">CVE-2018-14650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825410" comment="sos-collector-1.5-3.el7_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:675" version="1" class="patch">
	<metadata>
		<title>security update for NetworkManager (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3665.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3665.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15688">CVE-2018-15688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825411" comment="NetworkManager-1.12.0-8.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825412" comment="NetworkManager-adsl-1.12.0-8.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825413" comment="NetworkManager-bluetooth-1.12.0-8.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825414" comment="NetworkManager-config-server-1.12.0-8.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825415" comment="NetworkManager-dispatcher-routing-rules-1.12.0-8.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825416" comment="NetworkManager-glib-1.12.0-8.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825417" comment="NetworkManager-glib-devel-1.12.0-8.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825418" comment="NetworkManager-libnm-1.12.0-8.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825419" comment="NetworkManager-libnm-devel-1.12.0-8.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825420" comment="NetworkManager-ovs-1.12.0-8.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825421" comment="NetworkManager-ppp-1.12.0-8.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825422" comment="NetworkManager-team-1.12.0-8.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825423" comment="NetworkManager-tui-1.12.0-8.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825424" comment="NetworkManager-wifi-1.12.0-8.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825425" comment="NetworkManager-wwan-1.12.0-8.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:676" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3738.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3738.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16395">CVE-2018-16395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825426" comment="ruby-2.0.0.648-34.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825427" comment="ruby-devel-2.0.0.648-34.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825428" comment="ruby-doc-2.0.0.648-34.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825429" comment="ruby-irb-2.0.0.648-34.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825430" comment="ruby-libs-2.0.0.648-34.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825431" comment="ruby-tcltk-2.0.0.648-34.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825432" comment="rubygem-bigdecimal-1.2.0-34.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825433" comment="rubygem-io-console-0.4.2-34.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825434" comment="rubygem-json-1.7.7-34.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825435" comment="rubygem-minitest-4.3.2-34.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825436" comment="rubygem-psych-2.0.0-34.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825437" comment="rubygem-rake-0.9.6-34.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825438" comment="rubygem-rdoc-4.0.0-34.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825439" comment="rubygems-2.0.14.1-34.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825440" comment="rubygems-devel-2.0.14.1-34.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:677" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-16863" ref_url="https://www.suse.com/security/cve/CVE-2018-16863/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3761.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3761.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16863/">CVE-2018-16863 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16863">CVE-2018-16863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825441" comment="ghostscript-9.07-31.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825442" comment="ghostscript-cups-9.07-31.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825443" comment="ghostscript-devel-9.07-31.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825444" comment="ghostscript-doc-9.07-31.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825445" comment="ghostscript-gtk-9.07-31.el7_6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:678" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3833.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3833.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12405">CVE-2018-12405 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17466">CVE-2018-17466 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18492">CVE-2018-18492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18493">CVE-2018-18493 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18494">CVE-2018-18494 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18498">CVE-2018-18498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825446" comment="firefox-60.4.0-1.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:679" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802/" source="CVE"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961/" source="CVE"/>
		<reference ref_id="CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073/" source="CVE"/>
		<reference ref_id="CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284/" source="CVE"/>
		<reference ref_id="CVE-2018-19134" ref_url="https://www.suse.com/security/cve/CVE-2018-19134/" source="CVE"/>
		<reference ref_id="CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2018:3834.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2018:3834.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15911">CVE-2018-15911 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16541">CVE-2018-16541 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16802">CVE-2018-16802 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17183">CVE-2018-17183 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17961">CVE-2018-17961 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18073">CVE-2018-18073 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18284">CVE-2018-18284 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19134/">CVE-2018-19134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19134">CVE-2018-19134 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19409">CVE-2018-19409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825447" comment="ghostscript-9.07-31.el7_6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825448" comment="ghostscript-cups-9.07-31.el7_6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825449" comment="ghostscript-devel-9.07-31.el7_6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825450" comment="ghostscript-doc-9.07-31.el7_6.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825451" comment="ghostscript-gtk-9.07-31.el7_6.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:680" version="1" class="patch">
	<metadata>
		<title>security update for keepalived (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-19115" ref_url="https://www.suse.com/security/cve/CVE-2018-19115/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0022.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0022.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19115/">CVE-2018-19115 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19115">CVE-2018-19115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825452" comment="keepalived-1.3.5-8.el7_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:681" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<reference ref_id="CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864/" source="CVE"/>
		<reference ref_id="CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0049.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0049.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15688">CVE-2018-15688 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16864">CVE-2018-16864 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16865">CVE-2018-16865 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825453" comment="libgudev1-219-62.el7_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825454" comment="libgudev1-devel-219-62.el7_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825455" comment="systemd-219-62.el7_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825456" comment="systemd-devel-219-62.el7_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825457" comment="systemd-journal-gateway-219-62.el7_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825458" comment="systemd-libs-219-62.el7_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825459" comment="systemd-networkd-219-62.el7_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825460" comment="systemd-python-219-62.el7_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825461" comment="systemd-resolved-219-62.el7_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825462" comment="systemd-sysv-219-62.el7_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:682" version="1" class="patch">
	<metadata>
		<title>security update for libvncserver (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0059.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0059.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15127">CVE-2018-15127 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825463" comment="libvncserver-0.9.9-13.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825464" comment="libvncserver-devel-0.9.9-13.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:683" version="1" class="patch">
	<metadata>
		<title>security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0109.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0109.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18311">CVE-2018-18311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825465" comment="perl-5.16.3-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825466" comment="perl-CPAN-1.9800-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825467" comment="perl-ExtUtils-CBuilder-0.28.2.6-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825468" comment="perl-ExtUtils-Embed-1.30-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825469" comment="perl-ExtUtils-Install-1.58-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825470" comment="perl-IO-Zlib-1.10-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825471" comment="perl-Locale-Maketext-Simple-0.21-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825472" comment="perl-Module-CoreList-2.76.02-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825473" comment="perl-Module-Loaded-0.08-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825474" comment="perl-Object-Accessor-0.42-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825475" comment="perl-Package-Constants-0.02-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825476" comment="perl-Pod-Escapes-1.04-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825477" comment="perl-Time-Piece-1.20.1-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825478" comment="perl-core-5.16.3-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825479" comment="perl-devel-5.16.3-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825480" comment="perl-libs-5.16.3-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825481" comment="perl-macros-5.16.3-294.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825482" comment="perl-tests-5.16.3-294.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:684" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0160.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0160.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12405">CVE-2018-12405 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17466">CVE-2018-17466 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18492">CVE-2018-18492 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18493">CVE-2018-18493 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18494">CVE-2018-18494 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18498">CVE-2018-18498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825483" comment="thunderbird-60.4.0-1.el7_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:685" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18397" ref_url="https://www.suse.com/security/cve/CVE-2018-18397/" source="CVE"/>
		<reference ref_id="CVE-2018-18559" ref_url="https://www.suse.com/security/cve/CVE-2018-18559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0163.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0163.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18397/">CVE-2018-18397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18397">CVE-2018-18397 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18559/">CVE-2018-18559 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18559">CVE-2018-18559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825484" comment="bpftool-3.10.0-957.5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825485" comment="kernel-3.10.0-957.5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825486" comment="kernel-abi-whitelists-3.10.0-957.5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825487" comment="kernel-debug-3.10.0-957.5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825490" comment="kernel-doc-3.10.0-957.5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825491" comment="kernel-headers-3.10.0-957.5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825492" comment="kernel-tools-3.10.0-957.5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825493" comment="kernel-tools-libs-3.10.0-957.5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825495" comment="perf-3.10.0-957.5.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825496" comment="python-perf-3.10.0-957.5.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:686" version="1" class="patch">
	<metadata>
		<title>security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5742" ref_url="https://www.suse.com/security/cve/CVE-2018-5742/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0194.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0194.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5742/">CVE-2018-5742 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5742">CVE-2018-5742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825497" comment="bind-9.9.4-73.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825498" comment="bind-chroot-9.9.4-73.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825499" comment="bind-devel-9.9.4-73.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825500" comment="bind-libs-9.9.4-73.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825501" comment="bind-libs-lite-9.9.4-73.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825502" comment="bind-license-9.9.4-73.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825503" comment="bind-lite-devel-9.9.4-73.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825504" comment="bind-pkcs11-9.9.4-73.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825505" comment="bind-pkcs11-devel-9.9.4-73.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825506" comment="bind-pkcs11-libs-9.9.4-73.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825507" comment="bind-pkcs11-utils-9.9.4-73.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825508" comment="bind-sdb-9.9.4-73.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825509" comment="bind-sdb-chroot-9.9.4-73.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825510" comment="bind-utils-9.9.4-73.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:687" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-3815" ref_url="https://www.suse.com/security/cve/CVE-2019-3815/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0201.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0201.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3815/">CVE-2019-3815 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3815">CVE-2019-3815 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825511" comment="libgudev1-219-62.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825512" comment="libgudev1-devel-219-62.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825513" comment="systemd-219-62.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825514" comment="systemd-devel-219-62.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825515" comment="systemd-journal-gateway-219-62.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825516" comment="systemd-libs-219-62.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825517" comment="systemd-networkd-219-62.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825518" comment="systemd-python-219-62.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825519" comment="systemd-resolved-219-62.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825520" comment="systemd-sysv-219-62.el7_6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:688" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0219.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0219.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18500">CVE-2018-18500 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18501">CVE-2018-18501 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18505">CVE-2018-18505 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825521" comment="firefox-60.5.0-2.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:689" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475/" source="CVE"/>
		<reference ref_id="CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476/" source="CVE"/>
		<reference ref_id="CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477/" source="CVE"/>
		<reference ref_id="CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0229.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0229.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16540">CVE-2018-16540 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19475">CVE-2018-19475 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19476">CVE-2018-19476 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19477">CVE-2018-19477 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6116">CVE-2019-6116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825522" comment="ghostscript-9.07-31.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825523" comment="ghostscript-cups-9.07-31.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825524" comment="ghostscript-devel-9.07-31.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825525" comment="ghostscript-doc-9.07-31.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825526" comment="ghostscript-gtk-9.07-31.el7_6.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:690" version="1" class="patch">
	<metadata>
		<title>security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0230.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0230.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825527" comment="polkit-0.112-18.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825528" comment="polkit-devel-0.112-18.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825529" comment="polkit-docs-0.112-18.el7_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:691" version="1" class="patch">
	<metadata>
		<title>security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0231.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0231.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3813">CVE-2019-3813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825530" comment="spice-server-0.14.0-6.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825531" comment="spice-server-devel-0.14.0-6.el7_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:692" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0270.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0270.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5824">CVE-2016-5824 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18500">CVE-2018-18500 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18501">CVE-2018-18501 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18505">CVE-2018-18505 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825532" comment="thunderbird-60.5.0-1.el7_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:693" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0368.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0368.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6454">CVE-2019-6454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825533" comment="libgudev1-219-62.el7_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825534" comment="libgudev1-devel-219-62.el7_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825535" comment="systemd-219-62.el7_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825536" comment="systemd-devel-219-62.el7_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825537" comment="systemd-journal-gateway-219-62.el7_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825538" comment="systemd-libs-219-62.el7_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825539" comment="systemd-networkd-219-62.el7_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825540" comment="systemd-python-219-62.el7_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825541" comment="systemd-resolved-219-62.el7_6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825542" comment="systemd-sysv-219-62.el7_6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:694" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0374.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0374.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18356">CVE-2018-18356 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5785">CVE-2019-5785 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825543" comment="firefox-60.5.1-1.el7_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:695" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-8308" ref_url="https://www.suse.com/security/cve/CVE-2019-8308/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0375.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0375.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8308/">CVE-2019-8308 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8308">CVE-2019-8308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825544" comment="flatpak-1.0.2-4.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825545" comment="flatpak-builder-1.0.0-4.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825546" comment="flatpak-devel-1.0.2-4.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825547" comment="flatpak-libs-1.0.2-4.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:696" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0435.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0435.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825548" comment="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825549" comment="java-1.8.0-openjdk-accessibility-1.8.0.201.b09-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825550" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.201.b09-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825551" comment="java-1.8.0-openjdk-debug-1.8.0.201.b09-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825552" comment="java-1.8.0-openjdk-demo-1.8.0.201.b09-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825553" comment="java-1.8.0-openjdk-demo-debug-1.8.0.201.b09-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825554" comment="java-1.8.0-openjdk-devel-1.8.0.201.b09-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825555" comment="java-1.8.0-openjdk-devel-debug-1.8.0.201.b09-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825556" comment="java-1.8.0-openjdk-headless-1.8.0.201.b09-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825557" comment="java-1.8.0-openjdk-headless-debug-1.8.0.201.b09-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825558" comment="java-1.8.0-openjdk-javadoc-1.8.0.201.b09-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825559" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.201.b09-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825560" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.201.b09-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825561" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.201.b09-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825562" comment="java-1.8.0-openjdk-src-1.8.0.201.b09-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825563" comment="java-1.8.0-openjdk-src-debug-1.8.0.201.b09-0.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:697" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0436.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0436.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825564" comment="java-11-openjdk-11.0.2.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825565" comment="java-11-openjdk-debug-11.0.2.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825566" comment="java-11-openjdk-demo-11.0.2.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825567" comment="java-11-openjdk-demo-debug-11.0.2.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825568" comment="java-11-openjdk-devel-11.0.2.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825569" comment="java-11-openjdk-devel-debug-11.0.2.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825570" comment="java-11-openjdk-headless-11.0.2.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825571" comment="java-11-openjdk-headless-debug-11.0.2.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825572" comment="java-11-openjdk-javadoc-11.0.2.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825573" comment="java-11-openjdk-javadoc-debug-11.0.2.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825574" comment="java-11-openjdk-javadoc-zip-11.0.2.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825575" comment="java-11-openjdk-javadoc-zip-debug-11.0.2.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825576" comment="java-11-openjdk-jmods-11.0.2.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825577" comment="java-11-openjdk-jmods-debug-11.0.2.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825578" comment="java-11-openjdk-src-11.0.2.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825579" comment="java-11-openjdk-src-debug-11.0.2.7-0.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:698" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0464.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0464.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2422">CVE-2019-2422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825580" comment="java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825581" comment="java-1.7.0-openjdk-accessibility-1.7.0.211-2.6.17.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825582" comment="java-1.7.0-openjdk-demo-1.7.0.211-2.6.17.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825583" comment="java-1.7.0-openjdk-devel-1.7.0.211-2.6.17.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825584" comment="java-1.7.0-openjdk-headless-1.7.0.211-2.6.17.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825585" comment="java-1.7.0-openjdk-javadoc-1.7.0.211-2.6.17.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825586" comment="java-1.7.0-openjdk-src-1.7.0.211-2.6.17.1.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:699" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0483.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0483.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5407">CVE-2018-5407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825587" comment="openssl-1.0.2k-16.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825588" comment="openssl-devel-1.0.2k-16.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825589" comment="openssl-libs-1.0.2k-16.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825590" comment="openssl-perl-1.0.2k-16.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825591" comment="openssl-static-1.0.2k-16.el7_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:700" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0485.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0485.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11784">CVE-2018-11784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825592" comment="tomcat-7.0.76-9.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825593" comment="tomcat-admin-webapps-7.0.76-9.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825594" comment="tomcat-docs-webapp-7.0.76-9.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825595" comment="tomcat-el-2.2-api-7.0.76-9.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825596" comment="tomcat-javadoc-7.0.76-9.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825597" comment="tomcat-jsp-2.2-api-7.0.76-9.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825598" comment="tomcat-jsvc-7.0.76-9.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825599" comment="tomcat-lib-7.0.76-9.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825600" comment="tomcat-servlet-3.0-api-7.0.76-9.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825601" comment="tomcat-webapps-7.0.76-9.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:701" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-17972" ref_url="https://www.suse.com/security/cve/CVE-2018-17972/" source="CVE"/>
		<reference ref_id="CVE-2018-18445" ref_url="https://www.suse.com/security/cve/CVE-2018-18445/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0512.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0512.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17972/">CVE-2018-17972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17972">CVE-2018-17972 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18445/">CVE-2018-18445 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18445">CVE-2018-18445 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9568">CVE-2018-9568 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825602" comment="bpftool-3.10.0-957.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825603" comment="kernel-3.10.0-957.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825604" comment="kernel-abi-whitelists-3.10.0-957.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825605" comment="kernel-debug-3.10.0-957.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825608" comment="kernel-doc-3.10.0-957.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825609" comment="kernel-headers-3.10.0-957.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825610" comment="kernel-tools-3.10.0-957.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825611" comment="kernel-tools-libs-3.10.0-957.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825613" comment="perf-3.10.0-957.10.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825614" comment="python-perf-3.10.0-957.10.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:702" version="1" class="patch">
	<metadata>
		<title>security update for cloud-init (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-0816" ref_url="https://www.suse.com/security/cve/CVE-2019-0816/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0597.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0597.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-0816/">CVE-2019-0816 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0816">CVE-2019-0816 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825615" comment="cloud-init-18.2-1.el7_6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:703" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0622.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0622.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18506">CVE-2018-18506 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9788">CVE-2019-9788 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9790">CVE-2019-9790 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9791">CVE-2019-9791 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9792">CVE-2019-9792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9793">CVE-2019-9793 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9795">CVE-2019-9795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9796">CVE-2019-9796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825616" comment="firefox-60.6.0-3.el7_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:704" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0633.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0633.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3835">CVE-2019-3835 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3838">CVE-2019-3838 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825617" comment="ghostscript-9.07-31.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825618" comment="ghostscript-cups-9.07-31.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825619" comment="ghostscript-devel-9.07-31.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825620" comment="ghostscript-doc-9.07-31.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825621" comment="ghostscript-gtk-9.07-31.el7_6.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:705" version="1" class="patch">
	<metadata>
		<title>security update for openwsman (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0638.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0638.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3816">CVE-2019-3816 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825622" comment="libwsman-devel-2.6.3-6.git4391e5c.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825623" comment="libwsman1-2.6.3-6.git4391e5c.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825624" comment="openwsman-client-2.6.3-6.git4391e5c.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825625" comment="openwsman-perl-2.6.3-6.git4391e5c.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825626" comment="openwsman-python-2.6.3-6.git4391e5c.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825627" comment="openwsman-ruby-2.6.3-6.git4391e5c.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825628" comment="openwsman-server-2.6.3-6.git4391e5c.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:706" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0671.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0671.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9810">CVE-2019-9810 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9813">CVE-2019-9813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825629" comment="firefox-60.6.1-1.el7_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:707" version="1" class="patch">
	<metadata>
		<title>security update for libssh2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0679.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0679.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3855">CVE-2019-3855 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3856">CVE-2019-3856 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3857">CVE-2019-3857 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3863">CVE-2019-3863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825630" comment="libssh2-1.4.3-12.el7_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825631" comment="libssh2-devel-1.4.3-12.el7_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825632" comment="libssh2-docs-1.4.3-12.el7_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:708" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0681.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0681.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18506">CVE-2018-18506 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9788">CVE-2019-9788 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9790">CVE-2019-9790 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9791">CVE-2019-9791 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9792">CVE-2019-9792 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9793">CVE-2019-9793 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9795">CVE-2019-9795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9796">CVE-2019-9796 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9810">CVE-2019-9810 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9813">CVE-2019-9813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825633" comment="thunderbird-60.6.1-1.el7_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:709" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-8786" ref_url="https://www.suse.com/security/cve/CVE-2018-8786/" source="CVE"/>
		<reference ref_id="CVE-2018-8787" ref_url="https://www.suse.com/security/cve/CVE-2018-8787/" source="CVE"/>
		<reference ref_id="CVE-2018-8788" ref_url="https://www.suse.com/security/cve/CVE-2018-8788/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0697.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0697.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8786/">CVE-2018-8786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8786">CVE-2018-8786 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8787/">CVE-2018-8787 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8787">CVE-2018-8787 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8788/">CVE-2018-8788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8788">CVE-2018-8788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825634" comment="freerdp-1.0.2-15.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825635" comment="freerdp-devel-1.0.2-15.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825636" comment="freerdp-libs-1.0.2-15.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825637" comment="freerdp-plugins-1.0.2-15.el7_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:710" version="1" class="patch">
	<metadata>
		<title>security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0710.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0710.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825638" comment="python-2.7.5-77.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825639" comment="python-debug-2.7.5-77.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825640" comment="python-devel-2.7.5-77.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825641" comment="python-libs-2.7.5-77.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825642" comment="python-test-2.7.5-77.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825643" comment="python-tools-2.7.5-77.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825644" comment="tkinter-2.7.5-77.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:711" version="1" class="patch">
	<metadata>
		<title>security update for mod_auth_mellon (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-3877" ref_url="https://www.suse.com/security/cve/CVE-2019-3877/" source="CVE"/>
		<reference ref_id="CVE-2019-3878" ref_url="https://www.suse.com/security/cve/CVE-2019-3878/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0766.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0766.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3877/">CVE-2019-3877 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3877">CVE-2019-3877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3878/">CVE-2019-3878 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3878">CVE-2019-3878 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825645" comment="mod_auth_mellon-0.14.0-2.el7_6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825646" comment="mod_auth_mellon-diagnostics-0.14.0-2.el7_6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:712" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0775.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0775.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2698">CVE-2019-2698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825647" comment="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825648" comment="java-1.8.0-openjdk-accessibility-1.8.0.212.b04-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825649" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.212.b04-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825650" comment="java-1.8.0-openjdk-debug-1.8.0.212.b04-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825651" comment="java-1.8.0-openjdk-demo-1.8.0.212.b04-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825652" comment="java-1.8.0-openjdk-demo-debug-1.8.0.212.b04-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825653" comment="java-1.8.0-openjdk-devel-1.8.0.212.b04-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825654" comment="java-1.8.0-openjdk-devel-debug-1.8.0.212.b04-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825655" comment="java-1.8.0-openjdk-headless-1.8.0.212.b04-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825656" comment="java-1.8.0-openjdk-headless-debug-1.8.0.212.b04-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825657" comment="java-1.8.0-openjdk-javadoc-1.8.0.212.b04-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825658" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.212.b04-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825659" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.212.b04-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825660" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.212.b04-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825661" comment="java-1.8.0-openjdk-src-1.8.0.212.b04-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825662" comment="java-1.8.0-openjdk-src-debug-1.8.0.212.b04-0.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:713" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0778.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0778.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825663" comment="java-11-openjdk-11.0.3.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825664" comment="java-11-openjdk-debug-11.0.3.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825665" comment="java-11-openjdk-demo-11.0.3.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825666" comment="java-11-openjdk-demo-debug-11.0.3.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825667" comment="java-11-openjdk-devel-11.0.3.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825668" comment="java-11-openjdk-devel-debug-11.0.3.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825669" comment="java-11-openjdk-headless-11.0.3.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825670" comment="java-11-openjdk-headless-debug-11.0.3.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825671" comment="java-11-openjdk-javadoc-11.0.3.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825672" comment="java-11-openjdk-javadoc-debug-11.0.3.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825673" comment="java-11-openjdk-javadoc-zip-11.0.3.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825674" comment="java-11-openjdk-javadoc-zip-debug-11.0.3.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825675" comment="java-11-openjdk-jmods-11.0.3.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825676" comment="java-11-openjdk-jmods-debug-11.0.3.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825677" comment="java-11-openjdk-src-11.0.3.7-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825678" comment="java-11-openjdk-src-debug-11.0.3.7-0.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:714" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0791.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0791.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2602">CVE-2019-2602 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2684">CVE-2019-2684 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2698">CVE-2019-2698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825679" comment="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825680" comment="java-1.7.0-openjdk-accessibility-1.7.0.221-2.6.18.0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825681" comment="java-1.7.0-openjdk-demo-1.7.0.221-2.6.18.0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825682" comment="java-1.7.0-openjdk-devel-1.7.0.221-2.6.18.0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825683" comment="java-1.7.0-openjdk-headless-1.7.0.221-2.6.18.0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825684" comment="java-1.7.0-openjdk-javadoc-1.7.0.221-2.6.18.0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825685" comment="java-1.7.0-openjdk-src-1.7.0.221-2.6.18.0.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:715" version="1" class="patch">
	<metadata>
		<title>security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-12180" ref_url="https://www.suse.com/security/cve/CVE-2018-12180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0809.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0809.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12180/">CVE-2018-12180 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12180">CVE-2018-12180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825686" comment="OVMF-20180508-3.gitee3198e672e2.el7_6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:716" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:0818.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:0818.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6974">CVE-2019-6974 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7221">CVE-2019-7221 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825687" comment="bpftool-3.10.0-957.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825688" comment="kernel-3.10.0-957.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825689" comment="kernel-abi-whitelists-3.10.0-957.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825690" comment="kernel-debug-3.10.0-957.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825693" comment="kernel-doc-3.10.0-957.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825694" comment="kernel-headers-3.10.0-957.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825695" comment="kernel-tools-3.10.0-957.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825696" comment="kernel-tools-libs-3.10.0-957.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825698" comment="perf-3.10.0-957.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825699" comment="python-perf-3.10.0-957.12.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:717" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1017.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1017.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3839">CVE-2019-3839 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825700" comment="ghostscript-9.07-31.el7_6.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825701" comment="ghostscript-cups-9.07-31.el7_6.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825702" comment="ghostscript-devel-9.07-31.el7_6.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825703" comment="ghostscript-doc-9.07-31.el7_6.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825704" comment="ghostscript-gtk-9.07-31.el7_6.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:718" version="1" class="patch">
	<metadata>
		<title>security update for python-jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-10745" ref_url="https://www.suse.com/security/cve/CVE-2016-10745/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1022.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1022.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.7/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10745/">CVE-2016-10745 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10745">CVE-2016-10745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825705" comment="python-jinja2-2.7.2-3.el7_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:719" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-10063" ref_url="https://www.suse.com/security/cve/CVE-2019-10063/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1024.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1024.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10063/">CVE-2019-10063 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10063">CVE-2019-10063 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825706" comment="flatpak-1.0.2-5.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825707" comment="flatpak-builder-1.0.0-5.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825708" comment="flatpak-devel-1.0.2-5.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825709" comment="flatpak-libs-1.0.2-5.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:720" version="1" class="patch">
	<metadata>
		<title>security update for freeradius (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11234" ref_url="https://www.suse.com/security/cve/CVE-2019-11234/" source="CVE"/>
		<reference ref_id="CVE-2019-11235" ref_url="https://www.suse.com/security/cve/CVE-2019-11235/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1131.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1131.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11234/">CVE-2019-11234 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11234">CVE-2019-11234 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11235/">CVE-2019-11235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11235">CVE-2019-11235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825710" comment="freeradius-3.0.13-10.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825711" comment="freeradius-devel-3.0.13-10.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825712" comment="freeradius-doc-3.0.13-10.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825713" comment="freeradius-krb5-3.0.13-10.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825714" comment="freeradius-ldap-3.0.13-10.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825715" comment="freeradius-mysql-3.0.13-10.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825716" comment="freeradius-perl-3.0.13-10.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825717" comment="freeradius-postgresql-3.0.13-10.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825718" comment="freeradius-python-3.0.13-10.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825719" comment="freeradius-sqlite-3.0.13-10.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825720" comment="freeradius-unixODBC-3.0.13-10.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825721" comment="freeradius-utils-3.0.13-10.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:721" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1168.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1168.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825722" comment="bpftool-3.10.0-957.12.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825723" comment="kernel-3.10.0-957.12.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825724" comment="kernel-abi-whitelists-3.10.0-957.12.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825725" comment="kernel-debug-3.10.0-957.12.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825728" comment="kernel-doc-3.10.0-957.12.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825729" comment="kernel-headers-3.10.0-957.12.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825730" comment="kernel-tools-3.10.0-957.12.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825731" comment="kernel-tools-libs-3.10.0-957.12.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825733" comment="perf-3.10.0-957.12.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825734" comment="python-perf-3.10.0-957.12.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:722" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1177.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1177.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825735" comment="libvirt-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825736" comment="libvirt-admin-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825737" comment="libvirt-bash-completion-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825738" comment="libvirt-client-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825739" comment="libvirt-daemon-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825740" comment="libvirt-daemon-config-network-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825741" comment="libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825742" comment="libvirt-daemon-driver-interface-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825743" comment="libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825744" comment="libvirt-daemon-driver-network-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825745" comment="libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825746" comment="libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825747" comment="libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825748" comment="libvirt-daemon-driver-secret-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825749" comment="libvirt-daemon-driver-storage-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825750" comment="libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825751" comment="libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825752" comment="libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825753" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825754" comment="libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825755" comment="libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825756" comment="libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825757" comment="libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825758" comment="libvirt-daemon-kvm-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825759" comment="libvirt-daemon-lxc-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825760" comment="libvirt-devel-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825761" comment="libvirt-docs-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825762" comment="libvirt-libs-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825763" comment="libvirt-lock-sanlock-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825764" comment="libvirt-login-shell-4.5.0-10.el7_6.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825765" comment="libvirt-nss-4.5.0-10.el7_6.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:723" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1178.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1178.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825766" comment="qemu-img-1.5.3-160.el7_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825767" comment="qemu-kvm-1.5.3-160.el7_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825768" comment="qemu-kvm-common-1.5.3-160.el7_6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825769" comment="qemu-kvm-tools-1.5.3-160.el7_6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:724" version="1" class="patch">
	<metadata>
		<title>security update for wget (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1228.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1228.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5953">CVE-2019-5953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825770" comment="wget-1.14-18.el7_6.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825770" comment="wget-1.14-18.el7_6.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:725" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322/" source="CVE"/>
		<reference ref_id="CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323/" source="CVE"/>
		<reference ref_id="CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324/" source="CVE"/>
		<reference ref_id="CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1235.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1235.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8322">CVE-2019-8322 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8323">CVE-2019-8323 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8324">CVE-2019-8324 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8325">CVE-2019-8325 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825771" comment="ruby-2.0.0.648-35.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825772" comment="ruby-devel-2.0.0.648-35.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825773" comment="ruby-doc-2.0.0.648-35.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825774" comment="ruby-irb-2.0.0.648-35.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825775" comment="ruby-libs-2.0.0.648-35.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825776" comment="ruby-tcltk-2.0.0.648-35.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825777" comment="rubygem-bigdecimal-1.2.0-35.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825778" comment="rubygem-io-console-0.4.2-35.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825779" comment="rubygem-json-1.7.7-35.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825780" comment="rubygem-minitest-4.3.2-35.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825781" comment="rubygem-psych-2.0.0-35.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825782" comment="rubygem-rake-0.9.6-35.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825783" comment="rubygem-rdoc-4.0.0-35.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825784" comment="rubygems-2.0.14.1-35.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825785" comment="rubygems-devel-2.0.14.1-35.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:726" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-10132" ref_url="https://www.suse.com/security/cve/CVE-2019-10132/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1264.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1264.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10132/">CVE-2019-10132 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10132">CVE-2019-10132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825786" comment="libvirt-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825787" comment="libvirt-admin-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825788" comment="libvirt-bash-completion-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825789" comment="libvirt-client-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825790" comment="libvirt-daemon-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825791" comment="libvirt-daemon-config-network-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825792" comment="libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825793" comment="libvirt-daemon-driver-interface-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825794" comment="libvirt-daemon-driver-lxc-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825795" comment="libvirt-daemon-driver-network-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825796" comment="libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825797" comment="libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825798" comment="libvirt-daemon-driver-qemu-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825799" comment="libvirt-daemon-driver-secret-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825800" comment="libvirt-daemon-driver-storage-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825801" comment="libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825802" comment="libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825803" comment="libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825804" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825805" comment="libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825806" comment="libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825807" comment="libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825808" comment="libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825809" comment="libvirt-daemon-kvm-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825810" comment="libvirt-daemon-lxc-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825811" comment="libvirt-devel-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825812" comment="libvirt-docs-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825813" comment="libvirt-libs-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825814" comment="libvirt-lock-sanlock-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825815" comment="libvirt-login-shell-4.5.0-10.el7_6.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825816" comment="libvirt-nss-4.5.0-10.el7_6.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:727" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18511" ref_url="https://www.suse.com/security/cve/CVE-2018-18511/" source="CVE"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-5798" ref_url="https://www.suse.com/security/cve/CVE-2019-5798/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9797" ref_url="https://www.suse.com/security/cve/CVE-2019-9797/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1265.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1265.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18511/">CVE-2018-18511 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18511">CVE-2018-18511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11691">CVE-2019-11691 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11692">CVE-2019-11692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11693">CVE-2019-11693 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11698">CVE-2019-11698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5798/">CVE-2019-5798 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5798">CVE-2019-5798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9797/">CVE-2019-9797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9797">CVE-2019-9797 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9800">CVE-2019-9800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9816">CVE-2019-9816 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9817">CVE-2019-9817 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9819">CVE-2019-9819 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9820">CVE-2019-9820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825817" comment="firefox-60.7.0-1.el7_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:728" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1294.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1294.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5743">CVE-2018-5743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825818" comment="bind-9.9.4-74.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825819" comment="bind-chroot-9.9.4-74.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825820" comment="bind-devel-9.9.4-74.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825821" comment="bind-libs-9.9.4-74.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825822" comment="bind-libs-lite-9.9.4-74.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825823" comment="bind-license-9.9.4-74.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825824" comment="bind-lite-devel-9.9.4-74.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825825" comment="bind-pkcs11-9.9.4-74.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825826" comment="bind-pkcs11-devel-9.9.4-74.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825827" comment="bind-pkcs11-libs-9.9.4-74.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825828" comment="bind-pkcs11-utils-9.9.4-74.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825829" comment="bind-sdb-9.9.4-74.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825830" comment="bind-sdb-chroot-9.9.4-74.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825831" comment="bind-utils-9.9.4-74.el7_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:729" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18511" ref_url="https://www.suse.com/security/cve/CVE-2018-18511/" source="CVE"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-5798" ref_url="https://www.suse.com/security/cve/CVE-2019-5798/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9797" ref_url="https://www.suse.com/security/cve/CVE-2019-9797/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1309.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1309.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18511/">CVE-2018-18511 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18511">CVE-2018-18511 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11691">CVE-2019-11691 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11692">CVE-2019-11692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11693">CVE-2019-11693 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11698">CVE-2019-11698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5798/">CVE-2019-5798 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5798">CVE-2019-5798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9797/">CVE-2019-9797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9797">CVE-2019-9797 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9800">CVE-2019-9800 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9817">CVE-2019-9817 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9819">CVE-2019-9819 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9820">CVE-2019-9820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825832" comment="thunderbird-60.7.0-1.el7_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:730" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1481.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1481.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11479">CVE-2019-11479 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825833" comment="bpftool-3.10.0-957.21.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825834" comment="kernel-3.10.0-957.21.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825835" comment="kernel-abi-whitelists-3.10.0-957.21.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825836" comment="kernel-debug-3.10.0-957.21.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825839" comment="kernel-doc-3.10.0-957.21.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825840" comment="kernel-headers-3.10.0-957.21.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825841" comment="kernel-tools-3.10.0-957.21.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825842" comment="kernel-tools-libs-3.10.0-957.21.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825844" comment="perf-3.10.0-957.21.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825845" comment="python-perf-3.10.0-957.21.3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:731" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10166" ref_url="https://www.suse.com/security/cve/CVE-2019-10166/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="CVE-2019-10168" ref_url="https://www.suse.com/security/cve/CVE-2019-10168/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1579.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1579.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10161">CVE-2019-10161 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10166/">CVE-2019-10166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10166">CVE-2019-10166 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10167">CVE-2019-10167 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10168/">CVE-2019-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10168">CVE-2019-10168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825846" comment="libvirt-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825847" comment="libvirt-admin-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825848" comment="libvirt-bash-completion-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825849" comment="libvirt-client-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825850" comment="libvirt-daemon-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825851" comment="libvirt-daemon-config-network-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825852" comment="libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825853" comment="libvirt-daemon-driver-interface-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825854" comment="libvirt-daemon-driver-lxc-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825855" comment="libvirt-daemon-driver-network-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825856" comment="libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825857" comment="libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825858" comment="libvirt-daemon-driver-qemu-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825859" comment="libvirt-daemon-driver-secret-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825860" comment="libvirt-daemon-driver-storage-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825861" comment="libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825862" comment="libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825863" comment="libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825864" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825865" comment="libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825866" comment="libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825867" comment="libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825868" comment="libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825869" comment="libvirt-daemon-kvm-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825870" comment="libvirt-daemon-lxc-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825871" comment="libvirt-devel-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825872" comment="libvirt-docs-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825873" comment="libvirt-libs-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825874" comment="libvirt-lock-sanlock-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825875" comment="libvirt-login-shell-4.5.0-10.el7_6.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825876" comment="libvirt-nss-4.5.0-10.el7_6.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:732" version="1" class="patch">
	<metadata>
		<title>security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1587.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1587.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825877" comment="python-2.7.5-80.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825878" comment="python-debug-2.7.5-80.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825879" comment="python-devel-2.7.5-80.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825880" comment="python-libs-2.7.5-80.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825881" comment="python-test-2.7.5-80.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825882" comment="python-tools-2.7.5-80.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825883" comment="tkinter-2.7.5-80.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:733" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1603.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1603.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11707">CVE-2019-11707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11708">CVE-2019-11708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825884" comment="firefox-60.7.2-1.el7_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:734" version="1" class="patch">
	<metadata>
		<title>security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1619.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1619.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12735">CVE-2019-12735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825885" comment="vim-X11-8.0.1763-11.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825886" comment="vim-common-8.0.1763-11.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825887" comment="vim-enhanced-8.0.1763-11.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825888" comment="vim-filesystem-8.0.1763-11.el8_0 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825889" comment="vim-minimal-8.0.1763-11.el8_0 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:735" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11703" ref_url="https://www.suse.com/security/cve/CVE-2019-11703/" source="CVE"/>
		<reference ref_id="CVE-2019-11704" ref_url="https://www.suse.com/security/cve/CVE-2019-11704/" source="CVE"/>
		<reference ref_id="CVE-2019-11705" ref_url="https://www.suse.com/security/cve/CVE-2019-11705/" source="CVE"/>
		<reference ref_id="CVE-2019-11706" ref_url="https://www.suse.com/security/cve/CVE-2019-11706/" source="CVE"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1626.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1626.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11703/">CVE-2019-11703 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11703">CVE-2019-11703 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11704/">CVE-2019-11704 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11704">CVE-2019-11704 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11705/">CVE-2019-11705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11705">CVE-2019-11705 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11706/">CVE-2019-11706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11706">CVE-2019-11706 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11707">CVE-2019-11707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11708">CVE-2019-11708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825890" comment="thunderbird-60.7.2-2.el7_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:736" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1763.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1763.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825891" comment="firefox-60.8.0-1.el7_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:737" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1775.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1775.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11709">CVE-2019-11709 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11711">CVE-2019-11711 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11712">CVE-2019-11712 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11713">CVE-2019-11713 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11715">CVE-2019-11715 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11717">CVE-2019-11717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11730">CVE-2019-11730 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9811">CVE-2019-9811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825892" comment="thunderbird-60.8.0-1.el7_6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:738" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2818" ref_url="https://www.suse.com/security/cve/CVE-2019-2818/" source="CVE"/>
		<reference ref_id="CVE-2019-2821" ref_url="https://www.suse.com/security/cve/CVE-2019-2821/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1810.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1810.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2818/">CVE-2019-2818 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2818">CVE-2019-2818 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2821/">CVE-2019-2821 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2821">CVE-2019-2821 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825893" comment="java-11-openjdk-11.0.4.11-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825894" comment="java-11-openjdk-debug-11.0.4.11-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825895" comment="java-11-openjdk-demo-11.0.4.11-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825896" comment="java-11-openjdk-demo-debug-11.0.4.11-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825897" comment="java-11-openjdk-devel-11.0.4.11-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825898" comment="java-11-openjdk-devel-debug-11.0.4.11-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825899" comment="java-11-openjdk-headless-11.0.4.11-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825900" comment="java-11-openjdk-headless-debug-11.0.4.11-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825901" comment="java-11-openjdk-javadoc-11.0.4.11-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825902" comment="java-11-openjdk-javadoc-debug-11.0.4.11-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825903" comment="java-11-openjdk-javadoc-zip-11.0.4.11-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825904" comment="java-11-openjdk-javadoc-zip-debug-11.0.4.11-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825905" comment="java-11-openjdk-jmods-11.0.4.11-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825906" comment="java-11-openjdk-jmods-debug-11.0.4.11-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825907" comment="java-11-openjdk-src-11.0.4.11-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825908" comment="java-11-openjdk-src-debug-11.0.4.11-0.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:739" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1815.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1815.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2842">CVE-2019-2842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825909" comment="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825910" comment="java-1.8.0-openjdk-accessibility-1.8.0.222.b10-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825911" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.222.b10-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825912" comment="java-1.8.0-openjdk-debug-1.8.0.222.b10-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825913" comment="java-1.8.0-openjdk-demo-1.8.0.222.b10-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825914" comment="java-1.8.0-openjdk-demo-debug-1.8.0.222.b10-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825915" comment="java-1.8.0-openjdk-devel-1.8.0.222.b10-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825916" comment="java-1.8.0-openjdk-devel-debug-1.8.0.222.b10-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825917" comment="java-1.8.0-openjdk-headless-1.8.0.222.b10-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825918" comment="java-1.8.0-openjdk-headless-debug-1.8.0.222.b10-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825919" comment="java-1.8.0-openjdk-javadoc-1.8.0.222.b10-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825920" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.222.b10-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825921" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.222.b10-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825922" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.222.b10-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825923" comment="java-1.8.0-openjdk-src-1.8.0.222.b10-0.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825924" comment="java-1.8.0-openjdk-src-debug-1.8.0.222.b10-0.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:740" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1839.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1839.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2745">CVE-2019-2745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2762">CVE-2019-2762 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2769">CVE-2019-2769 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2786">CVE-2019-2786 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2816">CVE-2019-2816 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2842">CVE-2019-2842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825925" comment="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825926" comment="java-1.7.0-openjdk-accessibility-1.7.0.231-2.6.19.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825927" comment="java-1.7.0-openjdk-demo-1.7.0.231-2.6.19.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825928" comment="java-1.7.0-openjdk-devel-1.7.0.231-2.6.19.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825929" comment="java-1.7.0-openjdk-headless-1.7.0.231-2.6.19.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825930" comment="java-1.7.0-openjdk-javadoc-1.7.0.231-2.6.19.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825931" comment="java-1.7.0-openjdk-src-1.7.0.231-2.6.19.1.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:741" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-16871" ref_url="https://www.suse.com/security/cve/CVE-2018-16871/" source="CVE"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<reference ref_id="CVE-2019-11085" ref_url="https://www.suse.com/security/cve/CVE-2019-11085/" source="CVE"/>
		<reference ref_id="CVE-2019-11811" ref_url="https://www.suse.com/security/cve/CVE-2019-11811/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1873.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1873.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16871/">CVE-2018-16871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16871">CVE-2018-16871 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16884">CVE-2018-16884 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11085/">CVE-2019-11085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11085">CVE-2019-11085 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11811/">CVE-2019-11811 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11811">CVE-2019-11811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825932" comment="bpftool-3.10.0-957.27.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825933" comment="kernel-3.10.0-957.27.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825934" comment="kernel-abi-whitelists-3.10.0-957.27.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825935" comment="kernel-debug-3.10.0-957.27.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825938" comment="kernel-doc-3.10.0-957.27.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825939" comment="kernel-headers-3.10.0-957.27.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825940" comment="kernel-tools-3.10.0-957.27.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825941" comment="kernel-tools-libs-3.10.0-957.27.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825943" comment="perf-3.10.0-957.27.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825944" comment="python-perf-3.10.0-957.27.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:742" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1880.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1880.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14618">CVE-2018-14618 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825945" comment="curl-7.29.0-51.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825946" comment="libcurl-7.29.0-51.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825947" comment="libcurl-devel-7.29.0-51.el7_6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:743" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1883.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1883.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825948" comment="qemu-img-1.5.3-160.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825949" comment="qemu-kvm-1.5.3-160.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825950" comment="qemu-kvm-common-1.5.3-160.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825951" comment="qemu-kvm-tools-1.5.3-160.el7_6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:744" version="1" class="patch">
	<metadata>
		<title>security update for libssh2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1884.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1884.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3862">CVE-2019-3862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825952" comment="libssh2-1.4.3-12.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825953" comment="libssh2-devel-1.4.3-12.el7_6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825954" comment="libssh2-docs-1.4.3-12.el7_6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:745" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-3883" ref_url="https://www.suse.com/security/cve/CVE-2019-3883/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1896.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1896.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3883/">CVE-2019-3883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3883">CVE-2019-3883 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825955" comment="389-ds-base-1.3.8.4-25.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825956" comment="389-ds-base-devel-1.3.8.4-25.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825957" comment="389-ds-base-libs-1.3.8.4-25.1.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825958" comment="389-ds-base-snmp-1.3.8.4-25.1.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:746" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1312" ref_url="https://www.suse.com/security/cve/CVE-2018-1312/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:1898.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:1898.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1312/">CVE-2018-1312 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1312">CVE-2018-1312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825959" comment="httpd-2.4.6-89.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825960" comment="httpd-devel-2.4.6-89.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825961" comment="httpd-manual-2.4.6-89.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825962" comment="httpd-tools-2.4.6-89.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825963" comment="mod_ldap-2.4.6-89.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825964" comment="mod_proxy_html-2.4.6-89.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825965" comment="mod_session-2.4.6-89.el7_6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825966" comment="mod_ssl-2.4.6-89.el7_6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:747" version="1" class="patch">
	<metadata>
		<title>security update for icedtea-web (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-10181" ref_url="https://www.suse.com/security/cve/CVE-2019-10181/" source="CVE"/>
		<reference ref_id="CVE-2019-10182" ref_url="https://www.suse.com/security/cve/CVE-2019-10182/" source="CVE"/>
		<reference ref_id="CVE-2019-10185" ref_url="https://www.suse.com/security/cve/CVE-2019-10185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2003.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2003.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10181/">CVE-2019-10181 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10181">CVE-2019-10181 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10182/">CVE-2019-10182 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10182">CVE-2019-10182 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10185/">CVE-2019-10185 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10185">CVE-2019-10185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825967" comment="icedtea-web-1.7.1-2.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825968" comment="icedtea-web-devel-1.7.1-2.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825969" comment="icedtea-web-javadoc-1.7.1-2.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:748" version="1" class="patch">
	<metadata>
		<title>security update for zsh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2017.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2017.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13259">CVE-2018-13259 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825970" comment="zsh-5.0.2-33.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825971" comment="zsh-html-5.0.2-33.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:749" version="1" class="patch">
	<metadata>
		<title>security update for evince (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-16646" ref_url="https://www.suse.com/security/cve/CVE-2018-16646/" source="CVE"/>
		<reference ref_id="CVE-2018-18897" ref_url="https://www.suse.com/security/cve/CVE-2018-18897/" source="CVE"/>
		<reference ref_id="CVE-2018-19058" ref_url="https://www.suse.com/security/cve/CVE-2018-19058/" source="CVE"/>
		<reference ref_id="CVE-2018-19059" ref_url="https://www.suse.com/security/cve/CVE-2018-19059/" source="CVE"/>
		<reference ref_id="CVE-2018-19060" ref_url="https://www.suse.com/security/cve/CVE-2018-19060/" source="CVE"/>
		<reference ref_id="CVE-2018-19149" ref_url="https://www.suse.com/security/cve/CVE-2018-19149/" source="CVE"/>
		<reference ref_id="CVE-2018-20481" ref_url="https://www.suse.com/security/cve/CVE-2018-20481/" source="CVE"/>
		<reference ref_id="CVE-2018-20650" ref_url="https://www.suse.com/security/cve/CVE-2018-20650/" source="CVE"/>
		<reference ref_id="CVE-2018-20662" ref_url="https://www.suse.com/security/cve/CVE-2018-20662/" source="CVE"/>
		<reference ref_id="CVE-2019-7310" ref_url="https://www.suse.com/security/cve/CVE-2019-7310/" source="CVE"/>
		<reference ref_id="CVE-2019-9200" ref_url="https://www.suse.com/security/cve/CVE-2019-9200/" source="CVE"/>
		<reference ref_id="CVE-2019-9631" ref_url="https://www.suse.com/security/cve/CVE-2019-9631/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2022.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2022.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16646/">CVE-2018-16646 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16646">CVE-2018-16646 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18897/">CVE-2018-18897 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18897">CVE-2018-18897 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19058/">CVE-2018-19058 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19058">CVE-2018-19058 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19059/">CVE-2018-19059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19059">CVE-2018-19059 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19060/">CVE-2018-19060 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19060">CVE-2018-19060 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19149/">CVE-2018-19149 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19149">CVE-2018-19149 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20481/">CVE-2018-20481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20481">CVE-2018-20481 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20650/">CVE-2018-20650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20650">CVE-2018-20650 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20662/">CVE-2018-20662 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20662">CVE-2018-20662 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7310/">CVE-2019-7310 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7310">CVE-2019-7310 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9200/">CVE-2019-9200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9200">CVE-2019-9200 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9631/">CVE-2019-9631 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9631">CVE-2019-9631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825972" comment="evince-3.28.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825973" comment="evince-browser-plugin-3.28.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825974" comment="evince-devel-3.28.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825975" comment="evince-dvi-3.28.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825976" comment="evince-libs-3.28.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825977" comment="evince-nautilus-3.28.2-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825978" comment="okular-4.10.5-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825979" comment="okular-devel-4.10.5-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825980" comment="okular-libs-4.10.5-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825981" comment="okular-part-4.10.5-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825982" comment="poppler-0.26.5-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825983" comment="poppler-cpp-0.26.5-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825984" comment="poppler-cpp-devel-0.26.5-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825985" comment="poppler-demos-0.26.5-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825986" comment="poppler-devel-0.26.5-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825987" comment="poppler-glib-0.26.5-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825988" comment="poppler-glib-devel-0.26.5-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825989" comment="poppler-qt-0.26.5-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825990" comment="poppler-qt-devel-0.26.5-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825991" comment="poppler-utils-0.26.5-38.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:750" version="1" class="patch">
	<metadata>
		<title>security update for ruby (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742/" source="CVE"/>
		<reference ref_id="CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073/" source="CVE"/>
		<reference ref_id="CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074/" source="CVE"/>
		<reference ref_id="CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075/" source="CVE"/>
		<reference ref_id="CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076/" source="CVE"/>
		<reference ref_id="CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077/" source="CVE"/>
		<reference ref_id="CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078/" source="CVE"/>
		<reference ref_id="CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079/" source="CVE"/>
		<reference ref_id="CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396/" source="CVE"/>
		<reference ref_id="CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914/" source="CVE"/>
		<reference ref_id="CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777/" source="CVE"/>
		<reference ref_id="CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778/" source="CVE"/>
		<reference ref_id="CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779/" source="CVE"/>
		<reference ref_id="CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2028.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2028.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17742">CVE-2017-17742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000073">CVE-2018-1000073 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000074">CVE-2018-1000074 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000075">CVE-2018-1000075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000076">CVE-2018-1000076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000077">CVE-2018-1000077 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000078">CVE-2018-1000078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000079">CVE-2018-1000079 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16396">CVE-2018-16396 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6914">CVE-2018-6914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8777">CVE-2018-8777 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8778">CVE-2018-8778 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8779">CVE-2018-8779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8780">CVE-2018-8780 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009825992" comment="ruby-2.0.0.648-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825993" comment="ruby-devel-2.0.0.648-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825994" comment="ruby-doc-2.0.0.648-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825995" comment="ruby-irb-2.0.0.648-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825996" comment="ruby-libs-2.0.0.648-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825997" comment="ruby-tcltk-2.0.0.648-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825998" comment="rubygem-bigdecimal-1.2.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009825999" comment="rubygem-io-console-0.4.2-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826000" comment="rubygem-json-1.7.7-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826001" comment="rubygem-minitest-4.3.2-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826002" comment="rubygem-psych-2.0.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826003" comment="rubygem-rake-0.9.6-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826004" comment="rubygem-rdoc-4.0.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826005" comment="rubygems-2.0.14.1-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826006" comment="rubygems-devel-2.0.14.1-36.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:751" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093/" source="CVE"/>
		<reference ref_id="CVE-2018-13094" ref_url="https://www.suse.com/security/cve/CVE-2018-13094/" source="CVE"/>
		<reference ref_id="CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095/" source="CVE"/>
		<reference ref_id="CVE-2018-14625" ref_url="https://www.suse.com/security/cve/CVE-2018-14625/" source="CVE"/>
		<reference ref_id="CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734/" source="CVE"/>
		<reference ref_id="CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-16885" ref_url="https://www.suse.com/security/cve/CVE-2018-16885/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-7755" ref_url="https://www.suse.com/security/cve/CVE-2018-7755/" source="CVE"/>
		<reference ref_id="CVE-2018-8087" ref_url="https://www.suse.com/security/cve/CVE-2018-8087/" source="CVE"/>
		<reference ref_id="CVE-2018-9363" ref_url="https://www.suse.com/security/cve/CVE-2018-9363/" source="CVE"/>
		<reference ref_id="CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516/" source="CVE"/>
		<reference ref_id="CVE-2018-9517" ref_url="https://www.suse.com/security/cve/CVE-2018-9517/" source="CVE"/>
		<reference ref_id="CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882/" source="CVE"/>
		<reference ref_id="CVE-2019-3900" ref_url="https://www.suse.com/security/cve/CVE-2019-3900/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2029.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2029.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10853">CVE-2018-10853 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13053">CVE-2018-13053 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13093">CVE-2018-13093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13094/">CVE-2018-13094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13094">CVE-2018-13094 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13095">CVE-2018-13095 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-14625/">CVE-2018-14625 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14625">CVE-2018-14625 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14734">CVE-2018-14734 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15594">CVE-2018-15594 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16658">CVE-2018-16658 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16885/">CVE-2018-16885 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16885">CVE-2018-16885 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18281">CVE-2018-18281 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7755/">CVE-2018-7755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7755">CVE-2018-7755 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8087/">CVE-2018-8087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8087">CVE-2018-8087 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9363/">CVE-2018-9363 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9363">CVE-2018-9363 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9516">CVE-2018-9516 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-9517/">CVE-2018-9517 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9517">CVE-2018-9517 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11599">CVE-2019-11599 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11810">CVE-2019-11810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11833">CVE-2019-11833 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3459">CVE-2019-3459 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3460">CVE-2019-3460 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3882">CVE-2019-3882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3900/">CVE-2019-3900 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3900">CVE-2019-3900 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5489">CVE-2019-5489 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7222">CVE-2019-7222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826007" comment="bpftool-3.10.0-1062.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826008" comment="kernel-3.10.0-1062.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826009" comment="kernel-abi-whitelists-3.10.0-1062.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826010" comment="kernel-debug-3.10.0-1062.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826013" comment="kernel-doc-3.10.0-1062.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826014" comment="kernel-headers-3.10.0-1062.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826015" comment="kernel-tools-3.10.0-1062.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826016" comment="kernel-tools-libs-3.10.0-1062.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826018" comment="perf-3.10.0-1062.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826019" comment="python-perf-3.10.0-1062.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:752" version="1" class="patch">
	<metadata>
		<title>security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2030.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2030.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9948">CVE-2019-9948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826020" comment="python-2.7.5-86.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826021" comment="python-debug-2.7.5-86.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826022" comment="python-devel-2.7.5-86.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826023" comment="python-libs-2.7.5-86.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826024" comment="python-test-2.7.5-86.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826025" comment="python-tools-2.7.5-86.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826026" comment="tkinter-2.7.5-86.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:753" version="1" class="patch">
	<metadata>
		<title>security update for patch (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713/" source="CVE"/>
		<reference ref_id="CVE-2018-6952" ref_url="https://www.suse.com/security/cve/CVE-2018-6952/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2033.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2033.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10713">CVE-2016-10713 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6952/">CVE-2018-6952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6952">CVE-2018-6952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826027" comment="patch-2.7.1-11.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:754" version="1" class="patch">
	<metadata>
		<title>security update for python-requests (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2035.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2035.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826028" comment="python-requests-2.6.0-5.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:755" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-10153" ref_url="https://www.suse.com/security/cve/CVE-2019-10153/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2037.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2037.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10153/">CVE-2019-10153 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10153">CVE-2019-10153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826029" comment="fence-agents-aliyun-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826030" comment="fence-agents-all-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826031" comment="fence-agents-amt-ws-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826032" comment="fence-agents-apc-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826033" comment="fence-agents-apc-snmp-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826034" comment="fence-agents-aws-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826035" comment="fence-agents-azure-arm-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826036" comment="fence-agents-bladecenter-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826037" comment="fence-agents-brocade-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826038" comment="fence-agents-cisco-mds-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826039" comment="fence-agents-cisco-ucs-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826040" comment="fence-agents-common-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826041" comment="fence-agents-compute-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826042" comment="fence-agents-drac5-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826043" comment="fence-agents-eaton-snmp-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826044" comment="fence-agents-emerson-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826045" comment="fence-agents-eps-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826046" comment="fence-agents-gce-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826047" comment="fence-agents-heuristics-ping-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826048" comment="fence-agents-hpblade-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826049" comment="fence-agents-ibmblade-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826050" comment="fence-agents-ifmib-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826051" comment="fence-agents-ilo-moonshot-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826052" comment="fence-agents-ilo-mp-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826053" comment="fence-agents-ilo-ssh-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826054" comment="fence-agents-ilo2-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826055" comment="fence-agents-intelmodular-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826056" comment="fence-agents-ipdu-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826057" comment="fence-agents-ipmilan-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826058" comment="fence-agents-kdump-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826059" comment="fence-agents-mpath-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826060" comment="fence-agents-redfish-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826061" comment="fence-agents-rhevm-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826062" comment="fence-agents-rsa-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826063" comment="fence-agents-rsb-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826064" comment="fence-agents-sbd-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826065" comment="fence-agents-scsi-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826066" comment="fence-agents-virsh-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826067" comment="fence-agents-vmware-rest-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826068" comment="fence-agents-vmware-soap-4.2.1-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826069" comment="fence-agents-wti-4.2.1-24.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:756" version="1" class="patch">
	<metadata>
		<title>security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2046.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2046.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19788">CVE-2018-19788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826070" comment="polkit-0.112-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826071" comment="polkit-devel-0.112-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826072" comment="polkit-docs-0.112-22.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:757" version="1" class="patch">
	<metadata>
		<title>security update for libcgroup (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2047.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2047.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14348">CVE-2018-14348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826073" comment="libcgroup-0.41-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826074" comment="libcgroup-devel-0.41-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826075" comment="libcgroup-pam-0.41-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826076" comment="libcgroup-tools-0.41-21.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826073" comment="libcgroup-0.41-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826074" comment="libcgroup-devel-0.41-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826075" comment="libcgroup-pam-0.41-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826076" comment="libcgroup-tools-0.41-21.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:758" version="1" class="patch">
	<metadata>
		<title>security update for exempi (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-18233" ref_url="https://www.suse.com/security/cve/CVE-2017-18233/" source="CVE"/>
		<reference ref_id="CVE-2017-18234" ref_url="https://www.suse.com/security/cve/CVE-2017-18234/" source="CVE"/>
		<reference ref_id="CVE-2017-18236" ref_url="https://www.suse.com/security/cve/CVE-2017-18236/" source="CVE"/>
		<reference ref_id="CVE-2017-18238" ref_url="https://www.suse.com/security/cve/CVE-2017-18238/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2048.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2048.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18233/">CVE-2017-18233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18233">CVE-2017-18233 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18234/">CVE-2017-18234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18234">CVE-2017-18234 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18236/">CVE-2017-18236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18236">CVE-2017-18236 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18238/">CVE-2017-18238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18238">CVE-2017-18238 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7730">CVE-2018-7730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826077" comment="exempi-2.2.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826078" comment="exempi-devel-2.2.0-9.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826077" comment="exempi-2.2.0-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826078" comment="exempi-devel-2.2.0-9.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:759" version="1" class="patch">
	<metadata>
		<title>security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18584" ref_url="https://www.suse.com/security/cve/CVE-2018-18584/" source="CVE"/>
		<reference ref_id="CVE-2018-18585" ref_url="https://www.suse.com/security/cve/CVE-2018-18585/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2049.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2049.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18584/">CVE-2018-18584 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18584">CVE-2018-18584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18585/">CVE-2018-18585 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18585">CVE-2018-18585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826079" comment="libmspack-0.5-0.7.alpha.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826080" comment="libmspack-devel-0.5-0.7.alpha.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:760" version="1" class="patch">
	<metadata>
		<title>security update for compat-libtiff3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2051.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2051.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7456">CVE-2018-7456 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826081" comment="compat-libtiff3-3.9.4-12.el7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826081" comment="compat-libtiff3-3.9.4-12.el7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:761" version="1" class="patch">
	<metadata>
		<title>security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-3616" ref_url="https://www.suse.com/security/cve/CVE-2016-3616/" source="CVE"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-11213" ref_url="https://www.suse.com/security/cve/CVE-2018-11213/" source="CVE"/>
		<reference ref_id="CVE-2018-11214" ref_url="https://www.suse.com/security/cve/CVE-2018-11214/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<reference ref_id="CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2052.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2052.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3616/">CVE-2016-3616 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3616">CVE-2016-3616 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11212">CVE-2018-11212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11213/">CVE-2018-11213 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11213">CVE-2018-11213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11214/">CVE-2018-11214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11214">CVE-2018-11214 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11813">CVE-2018-11813 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14498">CVE-2018-14498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826082" comment="libjpeg-turbo-1.2.90-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826083" comment="libjpeg-turbo-devel-1.2.90-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826084" comment="libjpeg-turbo-static-1.2.90-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826085" comment="libjpeg-turbo-utils-1.2.90-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826086" comment="turbojpeg-1.2.90-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826087" comment="turbojpeg-devel-1.2.90-8.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826082" comment="libjpeg-turbo-1.2.90-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826083" comment="libjpeg-turbo-devel-1.2.90-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826084" comment="libjpeg-turbo-static-1.2.90-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826085" comment="libjpeg-turbo-utils-1.2.90-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826086" comment="turbojpeg-1.2.90-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826087" comment="turbojpeg-devel-1.2.90-8.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:762" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<reference ref_id="CVE-2018-10963" ref_url="https://www.suse.com/security/cve/CVE-2018-10963/" source="CVE"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-18557" ref_url="https://www.suse.com/security/cve/CVE-2018-18557/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2053.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2053.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3186">CVE-2016-3186 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10779">CVE-2018-10779 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10963/">CVE-2018-10963 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10963">CVE-2018-10963 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12900">CVE-2018-12900 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17100">CVE-2018-17100 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17101">CVE-2018-17101 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18557/">CVE-2018-18557 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18557">CVE-2018-18557 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18661">CVE-2018-18661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7456">CVE-2018-7456 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8905">CVE-2018-8905 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826088" comment="libtiff-4.0.3-32.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826089" comment="libtiff-devel-4.0.3-32.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826090" comment="libtiff-static-4.0.3-32.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826091" comment="libtiff-tools-4.0.3-32.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:763" version="1" class="patch">
	<metadata>
		<title>security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2057.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2057.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5741">CVE-2018-5741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826092" comment="bind-9.11.4-9.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826093" comment="bind-chroot-9.11.4-9.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826094" comment="bind-devel-9.11.4-9.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826095" comment="bind-export-devel-9.11.4-9.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826096" comment="bind-export-libs-9.11.4-9.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826097" comment="bind-libs-9.11.4-9.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826098" comment="bind-libs-lite-9.11.4-9.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826099" comment="bind-license-9.11.4-9.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826100" comment="bind-lite-devel-9.11.4-9.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826101" comment="bind-pkcs11-9.11.4-9.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826102" comment="bind-pkcs11-devel-9.11.4-9.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826103" comment="bind-pkcs11-libs-9.11.4-9.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826104" comment="bind-pkcs11-utils-9.11.4-9.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826105" comment="bind-sdb-9.11.4-9.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826106" comment="bind-sdb-chroot-9.11.4-9.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826107" comment="bind-utils-9.11.4-9.P2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:764" version="1" class="patch">
	<metadata>
		<title>security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-6470" ref_url="https://www.suse.com/security/cve/CVE-2019-6470/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2060.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2060.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6470/">CVE-2019-6470 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6470">CVE-2019-6470 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826108" comment="dhclient-4.2.5-77.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826109" comment="dhcp-4.2.5-77.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826110" comment="dhcp-common-4.2.5-77.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826111" comment="dhcp-devel-4.2.5-77.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826112" comment="dhcp-libs-4.2.5-77.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:765" version="1" class="patch">
	<metadata>
		<title>security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-12641" ref_url="https://www.suse.com/security/cve/CVE-2018-12641/" source="CVE"/>
		<reference ref_id="CVE-2018-12697" ref_url="https://www.suse.com/security/cve/CVE-2018-12697/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2075.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2075.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000876">CVE-2018-1000876 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12641/">CVE-2018-12641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12641">CVE-2018-12641 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12697/">CVE-2018-12697 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12697">CVE-2018-12697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826113" comment="binutils-2.27-41.base.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826114" comment="binutils-devel-2.27-41.base.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:766" version="1" class="patch">
	<metadata>
		<title>security update for ntp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2077.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2077.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12327">CVE-2018-12327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826115" comment="ntp-4.2.6p5-29.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826116" comment="ntp-doc-4.2.6p5-29.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826117" comment="ntp-perl-4.2.6p5-29.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826118" comment="ntpdate-4.2.6p5-29.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826119" comment="sntp-4.2.6p5-29.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:767" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2078.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2078.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826120" comment="qemu-img-1.5.3-167.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826121" comment="qemu-kvm-1.5.3-167.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826122" comment="qemu-kvm-common-1.5.3-167.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826123" comment="qemu-kvm-tools-1.5.3-167.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:768" version="1" class="patch">
	<metadata>
		<title>security update for gdm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<reference ref_id="CVE-2018-15853" ref_url="https://www.suse.com/security/cve/CVE-2018-15853/" source="CVE"/>
		<reference ref_id="CVE-2018-15854" ref_url="https://www.suse.com/security/cve/CVE-2018-15854/" source="CVE"/>
		<reference ref_id="CVE-2018-15855" ref_url="https://www.suse.com/security/cve/CVE-2018-15855/" source="CVE"/>
		<reference ref_id="CVE-2018-15856" ref_url="https://www.suse.com/security/cve/CVE-2018-15856/" source="CVE"/>
		<reference ref_id="CVE-2018-15857" ref_url="https://www.suse.com/security/cve/CVE-2018-15857/" source="CVE"/>
		<reference ref_id="CVE-2018-15859" ref_url="https://www.suse.com/security/cve/CVE-2018-15859/" source="CVE"/>
		<reference ref_id="CVE-2018-15861" ref_url="https://www.suse.com/security/cve/CVE-2018-15861/" source="CVE"/>
		<reference ref_id="CVE-2018-15862" ref_url="https://www.suse.com/security/cve/CVE-2018-15862/" source="CVE"/>
		<reference ref_id="CVE-2018-15863" ref_url="https://www.suse.com/security/cve/CVE-2018-15863/" source="CVE"/>
		<reference ref_id="CVE-2018-15864" ref_url="https://www.suse.com/security/cve/CVE-2018-15864/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2079.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2079.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14598">CVE-2018-14598 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14599">CVE-2018-14599 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14600">CVE-2018-14600 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15853/">CVE-2018-15853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15853">CVE-2018-15853 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15854/">CVE-2018-15854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15854">CVE-2018-15854 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15855/">CVE-2018-15855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15855">CVE-2018-15855 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15856/">CVE-2018-15856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15856">CVE-2018-15856 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15857/">CVE-2018-15857 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15857">CVE-2018-15857 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15859/">CVE-2018-15859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15859">CVE-2018-15859 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15861/">CVE-2018-15861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15861">CVE-2018-15861 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15862/">CVE-2018-15862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15862">CVE-2018-15862 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15863/">CVE-2018-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15863">CVE-2018-15863 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15864/">CVE-2018-15864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15864">CVE-2018-15864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826124" comment="gdm-3.28.2-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826125" comment="gdm-devel-3.28.2-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826126" comment="gdm-pam-extensions-devel-3.28.2-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826127" comment="libX11-1.6.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826128" comment="libX11-common-1.6.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826129" comment="libX11-devel-1.6.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826130" comment="libxkbcommon-0.7.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826131" comment="libxkbcommon-devel-0.7.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826132" comment="libxkbcommon-x11-0.7.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826133" comment="libxkbcommon-x11-devel-0.7.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826134" comment="mesa-libGLw-8.0.0-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826135" comment="mesa-libGLw-devel-8.0.0-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826136" comment="xorg-x11-drv-ati-19.0.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826137" comment="xorg-x11-drv-vesa-2.4.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826138" comment="xorg-x11-drv-wacom-0.36.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826139" comment="xorg-x11-drv-wacom-devel-0.36.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826140" comment="xorg-x11-server-Xdmx-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826141" comment="xorg-x11-server-Xephyr-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826142" comment="xorg-x11-server-Xnest-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826143" comment="xorg-x11-server-Xorg-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826144" comment="xorg-x11-server-Xvfb-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826145" comment="xorg-x11-server-Xwayland-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826146" comment="xorg-x11-server-common-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826147" comment="xorg-x11-server-devel-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826148" comment="xorg-x11-server-source-1.20.4-7.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826124" comment="gdm-3.28.2-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826125" comment="gdm-devel-3.28.2-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826126" comment="gdm-pam-extensions-devel-3.28.2-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826127" comment="libX11-1.6.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826128" comment="libX11-common-1.6.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826129" comment="libX11-devel-1.6.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826130" comment="libxkbcommon-0.7.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826131" comment="libxkbcommon-devel-0.7.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826132" comment="libxkbcommon-x11-0.7.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826133" comment="libxkbcommon-x11-devel-0.7.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826134" comment="mesa-libGLw-8.0.0-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826135" comment="mesa-libGLw-devel-8.0.0-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826136" comment="xorg-x11-drv-ati-19.0.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826137" comment="xorg-x11-drv-vesa-2.4.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826138" comment="xorg-x11-drv-wacom-0.36.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826139" comment="xorg-x11-drv-wacom-devel-0.36.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826140" comment="xorg-x11-server-Xdmx-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826141" comment="xorg-x11-server-Xephyr-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826142" comment="xorg-x11-server-Xnest-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826143" comment="xorg-x11-server-Xorg-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826144" comment="xorg-x11-server-Xvfb-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826145" comment="xorg-x11-server-Xwayland-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826146" comment="xorg-x11-server-common-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826147" comment="xorg-x11-server-devel-1.20.4-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826148" comment="xorg-x11-server-source-1.20.4-7.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:769" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686/" source="CVE"/>
		<reference ref_id="CVE-2018-16866" ref_url="https://www.suse.com/security/cve/CVE-2018-16866/" source="CVE"/>
		<reference ref_id="CVE-2018-16888" ref_url="https://www.suse.com/security/cve/CVE-2018-16888/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2091.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2091.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15686">CVE-2018-15686 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16866/">CVE-2018-16866 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16866">CVE-2018-16866 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16888/">CVE-2018-16888 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16888">CVE-2018-16888 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826149" comment="libgudev1-219-67.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826150" comment="libgudev1-devel-219-67.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826151" comment="systemd-219-67.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826152" comment="systemd-devel-219-67.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826153" comment="systemd-journal-gateway-219-67.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826154" comment="systemd-libs-219-67.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826155" comment="systemd-networkd-219-67.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826156" comment="systemd-python-219-67.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826157" comment="systemd-resolved-219-67.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826158" comment="systemd-sysv-219-67.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:770" version="1" class="patch">
	<metadata>
		<title>security update for perl-Archive-Tar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2097.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2097.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12015">CVE-2018-12015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826159" comment="perl-Archive-Tar-1.92-3.el7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826159" comment="perl-Archive-Tar-1.92-3.el7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:771" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2099.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2099.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3880">CVE-2019-3880 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826160" comment="ctdb-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826161" comment="ctdb-tests-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826162" comment="libsmbclient-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826163" comment="libsmbclient-devel-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826164" comment="libwbclient-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826165" comment="libwbclient-devel-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826166" comment="samba-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826167" comment="samba-client-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826168" comment="samba-client-libs-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826169" comment="samba-common-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826170" comment="samba-common-libs-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826171" comment="samba-common-tools-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826172" comment="samba-dc-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826173" comment="samba-dc-libs-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826174" comment="samba-devel-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826175" comment="samba-krb5-printing-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826176" comment="samba-libs-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826177" comment="samba-pidl-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826178" comment="samba-python-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826179" comment="samba-python-test-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826180" comment="samba-test-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826181" comment="samba-test-libs-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826182" comment="samba-vfs-glusterfs-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826183" comment="samba-winbind-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826184" comment="samba-winbind-clients-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826185" comment="samba-winbind-krb5-locator-4.9.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826186" comment="samba-winbind-modules-4.9.1-6.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:772" version="1" class="patch">
	<metadata>
		<title>security update for exiv2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-17724" ref_url="https://www.suse.com/security/cve/CVE-2017-17724/" source="CVE"/>
		<reference ref_id="CVE-2018-10772" ref_url="https://www.suse.com/security/cve/CVE-2018-10772/" source="CVE"/>
		<reference ref_id="CVE-2018-10958" ref_url="https://www.suse.com/security/cve/CVE-2018-10958/" source="CVE"/>
		<reference ref_id="CVE-2018-10998" ref_url="https://www.suse.com/security/cve/CVE-2018-10998/" source="CVE"/>
		<reference ref_id="CVE-2018-11037" ref_url="https://www.suse.com/security/cve/CVE-2018-11037/" source="CVE"/>
		<reference ref_id="CVE-2018-12264" ref_url="https://www.suse.com/security/cve/CVE-2018-12264/" source="CVE"/>
		<reference ref_id="CVE-2018-12265" ref_url="https://www.suse.com/security/cve/CVE-2018-12265/" source="CVE"/>
		<reference ref_id="CVE-2018-14046" ref_url="https://www.suse.com/security/cve/CVE-2018-14046/" source="CVE"/>
		<reference ref_id="CVE-2018-17282" ref_url="https://www.suse.com/security/cve/CVE-2018-17282/" source="CVE"/>
		<reference ref_id="CVE-2018-17581" ref_url="https://www.suse.com/security/cve/CVE-2018-17581/" source="CVE"/>
		<reference ref_id="CVE-2018-18915" ref_url="https://www.suse.com/security/cve/CVE-2018-18915/" source="CVE"/>
		<reference ref_id="CVE-2018-19107" ref_url="https://www.suse.com/security/cve/CVE-2018-19107/" source="CVE"/>
		<reference ref_id="CVE-2018-19108" ref_url="https://www.suse.com/security/cve/CVE-2018-19108/" source="CVE"/>
		<reference ref_id="CVE-2018-19535" ref_url="https://www.suse.com/security/cve/CVE-2018-19535/" source="CVE"/>
		<reference ref_id="CVE-2018-19607" ref_url="https://www.suse.com/security/cve/CVE-2018-19607/" source="CVE"/>
		<reference ref_id="CVE-2018-20096" ref_url="https://www.suse.com/security/cve/CVE-2018-20096/" source="CVE"/>
		<reference ref_id="CVE-2018-20097" ref_url="https://www.suse.com/security/cve/CVE-2018-20097/" source="CVE"/>
		<reference ref_id="CVE-2018-20098" ref_url="https://www.suse.com/security/cve/CVE-2018-20098/" source="CVE"/>
		<reference ref_id="CVE-2018-20099" ref_url="https://www.suse.com/security/cve/CVE-2018-20099/" source="CVE"/>
		<reference ref_id="CVE-2018-8976" ref_url="https://www.suse.com/security/cve/CVE-2018-8976/" source="CVE"/>
		<reference ref_id="CVE-2018-8977" ref_url="https://www.suse.com/security/cve/CVE-2018-8977/" source="CVE"/>
		<reference ref_id="CVE-2018-9305" ref_url="https://www.suse.com/security/cve/CVE-2018-9305/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2101.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2101.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17724/">CVE-2017-17724 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17724">CVE-2017-17724 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10772/">CVE-2018-10772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10772">CVE-2018-10772 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10958/">CVE-2018-10958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10958">CVE-2018-10958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10998/">CVE-2018-10998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10998">CVE-2018-10998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-11037/">CVE-2018-11037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11037">CVE-2018-11037 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12264/">CVE-2018-12264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12264">CVE-2018-12264 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12265/">CVE-2018-12265 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12265">CVE-2018-12265 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14046/">CVE-2018-14046 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14046">CVE-2018-14046 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17282/">CVE-2018-17282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17282">CVE-2018-17282 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17581/">CVE-2018-17581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17581">CVE-2018-17581 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18915/">CVE-2018-18915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18915">CVE-2018-18915 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19107/">CVE-2018-19107 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19107">CVE-2018-19107 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19108/">CVE-2018-19108 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19108">CVE-2018-19108 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19535/">CVE-2018-19535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19535">CVE-2018-19535 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19607/">CVE-2018-19607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19607">CVE-2018-19607 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20096/">CVE-2018-20096 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20096">CVE-2018-20096 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20097/">CVE-2018-20097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20097">CVE-2018-20097 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20098/">CVE-2018-20098 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20098">CVE-2018-20098 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20099/">CVE-2018-20099 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20099">CVE-2018-20099 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8976/">CVE-2018-8976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8976">CVE-2018-8976 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8977/">CVE-2018-8977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8977">CVE-2018-8977 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9305/">CVE-2018-9305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9305">CVE-2018-9305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826187" comment="exiv2-0.27.0-2.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826188" comment="exiv2-devel-0.27.0-2.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826189" comment="exiv2-doc-0.27.0-2.el7_6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826190" comment="exiv2-libs-0.27.0-2.el7_6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:773" version="1" class="patch">
	<metadata>
		<title>security update for rsyslog (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-16881" ref_url="https://www.suse.com/security/cve/CVE-2018-16881/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2110.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2110.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16881/">CVE-2018-16881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16881">CVE-2018-16881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826191" comment="rsyslog-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826192" comment="rsyslog-crypto-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826193" comment="rsyslog-doc-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826194" comment="rsyslog-elasticsearch-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826195" comment="rsyslog-gnutls-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826196" comment="rsyslog-gssapi-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826197" comment="rsyslog-kafka-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826198" comment="rsyslog-libdbi-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826199" comment="rsyslog-mmaudit-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826200" comment="rsyslog-mmjsonparse-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826201" comment="rsyslog-mmkubernetes-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826202" comment="rsyslog-mmnormalize-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826203" comment="rsyslog-mmsnmptrapd-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826204" comment="rsyslog-mysql-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826205" comment="rsyslog-pgsql-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826206" comment="rsyslog-relp-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826207" comment="rsyslog-snmp-8.24.0-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826208" comment="rsyslog-udpspoof-8.24.0-38.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:774" version="1" class="patch">
	<metadata>
		<title>security update for mod_auth_openidc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-6059" ref_url="https://www.suse.com/security/cve/CVE-2017-6059/" source="CVE"/>
		<reference ref_id="CVE-2017-6413" ref_url="https://www.suse.com/security/cve/CVE-2017-6413/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2112.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2112.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6059/">CVE-2017-6059 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6059">CVE-2017-6059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6413/">CVE-2017-6413 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6413">CVE-2017-6413 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826209" comment="mod_auth_openidc-1.8.8-5.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:775" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2118.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2118.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">CVE-2016-10739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826210" comment="glibc-2.17-292.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826211" comment="glibc-common-2.17-292.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826212" comment="glibc-devel-2.17-292.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826213" comment="glibc-headers-2.17-292.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826214" comment="glibc-static-2.17-292.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826215" comment="glibc-utils-2.17-292.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826216" comment="nscd-2.17-292.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:776" version="1" class="patch">
	<metadata>
		<title>security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-5731" ref_url="https://www.suse.com/security/cve/CVE-2017-5731/" source="CVE"/>
		<reference ref_id="CVE-2017-5732" ref_url="https://www.suse.com/security/cve/CVE-2017-5732/" source="CVE"/>
		<reference ref_id="CVE-2017-5733" ref_url="https://www.suse.com/security/cve/CVE-2017-5733/" source="CVE"/>
		<reference ref_id="CVE-2017-5734" ref_url="https://www.suse.com/security/cve/CVE-2017-5734/" source="CVE"/>
		<reference ref_id="CVE-2017-5735" ref_url="https://www.suse.com/security/cve/CVE-2017-5735/" source="CVE"/>
		<reference ref_id="CVE-2018-12181" ref_url="https://www.suse.com/security/cve/CVE-2018-12181/" source="CVE"/>
		<reference ref_id="CVE-2018-3613" ref_url="https://www.suse.com/security/cve/CVE-2018-3613/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="CVE-2019-0160" ref_url="https://www.suse.com/security/cve/CVE-2019-0160/" source="CVE"/>
		<reference ref_id="CVE-2019-0161" ref_url="https://www.suse.com/security/cve/CVE-2019-0161/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2125.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2125.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5731/">CVE-2017-5731 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5731">CVE-2017-5731 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5732/">CVE-2017-5732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5732">CVE-2017-5732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5733/">CVE-2017-5733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5733">CVE-2017-5733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5734/">CVE-2017-5734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5734">CVE-2017-5734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5735/">CVE-2017-5735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-5735">CVE-2017-5735 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12181/">CVE-2018-12181 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12181">CVE-2018-12181 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3613/">CVE-2018-3613 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3613">CVE-2018-3613 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5407">CVE-2018-5407 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0160/">CVE-2019-0160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0160">CVE-2019-0160 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0161/">CVE-2019-0161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0161">CVE-2019-0161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826217" comment="OVMF-20180508-6.gitee3198e672e2.el7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826217" comment="OVMF-20180508-6.gitee3198e672e2.el7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:777" version="1" class="patch">
	<metadata>
		<title>security update for libwpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-19208" ref_url="https://www.suse.com/security/cve/CVE-2018-19208/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2126.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2126.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19208/">CVE-2018-19208 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19208">CVE-2018-19208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826218" comment="libwpd-0.10.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826219" comment="libwpd-devel-0.10.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826220" comment="libwpd-doc-0.10.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826221" comment="libwpd-tools-0.10.0-2.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826218" comment="libwpd-0.10.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826219" comment="libwpd-devel-0.10.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826220" comment="libwpd-doc-0.10.0-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826221" comment="libwpd-tools-0.10.0-2.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:778" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qt3d (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19869" ref_url="https://www.suse.com/security/cve/CVE-2018-19869/" source="CVE"/>
		<reference ref_id="CVE-2018-19870" ref_url="https://www.suse.com/security/cve/CVE-2018-19870/" source="CVE"/>
		<reference ref_id="CVE-2018-19871" ref_url="https://www.suse.com/security/cve/CVE-2018-19871/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2135.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2135.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15518">CVE-2018-15518 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19869/">CVE-2018-19869 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19869">CVE-2018-19869 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19870/">CVE-2018-19870 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19870">CVE-2018-19870 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19871/">CVE-2018-19871 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19871">CVE-2018-19871 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19873">CVE-2018-19873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826222" comment="qt5-assistant-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826223" comment="qt5-designer-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826224" comment="qt5-doctools-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826225" comment="qt5-linguist-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826226" comment="qt5-qdbusviewer-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826227" comment="qt5-qt3d-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826228" comment="qt5-qt3d-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826229" comment="qt5-qt3d-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826230" comment="qt5-qt3d-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826231" comment="qt5-qtbase-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826232" comment="qt5-qtbase-common-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826233" comment="qt5-qtbase-devel-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826234" comment="qt5-qtbase-doc-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826235" comment="qt5-qtbase-examples-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826236" comment="qt5-qtbase-gui-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826237" comment="qt5-qtbase-mysql-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826238" comment="qt5-qtbase-odbc-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826239" comment="qt5-qtbase-postgresql-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826240" comment="qt5-qtbase-static-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826241" comment="qt5-qtcanvas3d-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826242" comment="qt5-qtcanvas3d-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826243" comment="qt5-qtcanvas3d-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826244" comment="qt5-qtconnectivity-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826245" comment="qt5-qtconnectivity-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826246" comment="qt5-qtconnectivity-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826247" comment="qt5-qtconnectivity-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826248" comment="qt5-qtdeclarative-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826249" comment="qt5-qtdeclarative-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826250" comment="qt5-qtdeclarative-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826251" comment="qt5-qtdeclarative-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826252" comment="qt5-qtdeclarative-static-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826253" comment="qt5-qtdoc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826254" comment="qt5-qtgraphicaleffects-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826255" comment="qt5-qtgraphicaleffects-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826256" comment="qt5-qtimageformats-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826257" comment="qt5-qtimageformats-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826258" comment="qt5-qtlocation-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826259" comment="qt5-qtlocation-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826260" comment="qt5-qtlocation-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826261" comment="qt5-qtlocation-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826262" comment="qt5-qtmultimedia-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826263" comment="qt5-qtmultimedia-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826264" comment="qt5-qtmultimedia-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826265" comment="qt5-qtmultimedia-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826266" comment="qt5-qtquickcontrols-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826267" comment="qt5-qtquickcontrols-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826268" comment="qt5-qtquickcontrols-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826269" comment="qt5-qtquickcontrols2-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826270" comment="qt5-qtquickcontrols2-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826271" comment="qt5-qtquickcontrols2-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826272" comment="qt5-qtquickcontrols2-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826273" comment="qt5-qtscript-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826274" comment="qt5-qtscript-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826275" comment="qt5-qtscript-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826276" comment="qt5-qtscript-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826277" comment="qt5-qtsensors-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826278" comment="qt5-qtsensors-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826279" comment="qt5-qtsensors-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826280" comment="qt5-qtsensors-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826281" comment="qt5-qtserialbus-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826282" comment="qt5-qtserialbus-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826283" comment="qt5-qtserialbus-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826284" comment="qt5-qtserialbus-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826285" comment="qt5-qtserialport-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826286" comment="qt5-qtserialport-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826287" comment="qt5-qtserialport-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826288" comment="qt5-qtserialport-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826289" comment="qt5-qtsvg-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826290" comment="qt5-qtsvg-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826291" comment="qt5-qtsvg-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826292" comment="qt5-qtsvg-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826293" comment="qt5-qttools-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826294" comment="qt5-qttools-common-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826295" comment="qt5-qttools-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826296" comment="qt5-qttools-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826297" comment="qt5-qttools-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826298" comment="qt5-qttools-libs-designer-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826299" comment="qt5-qttools-libs-designercomponents-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826300" comment="qt5-qttools-libs-help-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826301" comment="qt5-qttools-static-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826302" comment="qt5-qttranslations-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826303" comment="qt5-qtwayland-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826304" comment="qt5-qtwayland-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826305" comment="qt5-qtwayland-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826306" comment="qt5-qtwayland-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826307" comment="qt5-qtwebchannel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826308" comment="qt5-qtwebchannel-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826309" comment="qt5-qtwebchannel-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826310" comment="qt5-qtwebchannel-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826311" comment="qt5-qtwebsockets-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826312" comment="qt5-qtwebsockets-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826313" comment="qt5-qtwebsockets-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826314" comment="qt5-qtwebsockets-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826315" comment="qt5-qtx11extras-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826316" comment="qt5-qtx11extras-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826317" comment="qt5-qtx11extras-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826318" comment="qt5-qtxmlpatterns-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826319" comment="qt5-qtxmlpatterns-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826320" comment="qt5-qtxmlpatterns-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826321" comment="qt5-qtxmlpatterns-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826322" comment="qt5-rpm-macros-5.9.7-2.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826222" comment="qt5-assistant-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826223" comment="qt5-designer-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826224" comment="qt5-doctools-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826225" comment="qt5-linguist-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826226" comment="qt5-qdbusviewer-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826227" comment="qt5-qt3d-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826228" comment="qt5-qt3d-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826229" comment="qt5-qt3d-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826230" comment="qt5-qt3d-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826231" comment="qt5-qtbase-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826232" comment="qt5-qtbase-common-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826233" comment="qt5-qtbase-devel-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826234" comment="qt5-qtbase-doc-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826235" comment="qt5-qtbase-examples-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826236" comment="qt5-qtbase-gui-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826237" comment="qt5-qtbase-mysql-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826238" comment="qt5-qtbase-odbc-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826239" comment="qt5-qtbase-postgresql-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826240" comment="qt5-qtbase-static-5.9.7-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826241" comment="qt5-qtcanvas3d-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826242" comment="qt5-qtcanvas3d-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826243" comment="qt5-qtcanvas3d-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826244" comment="qt5-qtconnectivity-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826245" comment="qt5-qtconnectivity-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826246" comment="qt5-qtconnectivity-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826247" comment="qt5-qtconnectivity-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826248" comment="qt5-qtdeclarative-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826249" comment="qt5-qtdeclarative-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826250" comment="qt5-qtdeclarative-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826251" comment="qt5-qtdeclarative-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826252" comment="qt5-qtdeclarative-static-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826253" comment="qt5-qtdoc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826254" comment="qt5-qtgraphicaleffects-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826255" comment="qt5-qtgraphicaleffects-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826256" comment="qt5-qtimageformats-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826257" comment="qt5-qtimageformats-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826258" comment="qt5-qtlocation-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826259" comment="qt5-qtlocation-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826260" comment="qt5-qtlocation-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826261" comment="qt5-qtlocation-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826262" comment="qt5-qtmultimedia-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826263" comment="qt5-qtmultimedia-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826264" comment="qt5-qtmultimedia-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826265" comment="qt5-qtmultimedia-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826266" comment="qt5-qtquickcontrols-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826267" comment="qt5-qtquickcontrols-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826268" comment="qt5-qtquickcontrols-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826269" comment="qt5-qtquickcontrols2-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826270" comment="qt5-qtquickcontrols2-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826271" comment="qt5-qtquickcontrols2-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826272" comment="qt5-qtquickcontrols2-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826273" comment="qt5-qtscript-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826274" comment="qt5-qtscript-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826275" comment="qt5-qtscript-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826276" comment="qt5-qtscript-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826277" comment="qt5-qtsensors-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826278" comment="qt5-qtsensors-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826279" comment="qt5-qtsensors-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826280" comment="qt5-qtsensors-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826281" comment="qt5-qtserialbus-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826282" comment="qt5-qtserialbus-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826283" comment="qt5-qtserialbus-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826284" comment="qt5-qtserialbus-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826285" comment="qt5-qtserialport-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826286" comment="qt5-qtserialport-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826287" comment="qt5-qtserialport-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826288" comment="qt5-qtserialport-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826289" comment="qt5-qtsvg-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826290" comment="qt5-qtsvg-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826291" comment="qt5-qtsvg-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826292" comment="qt5-qtsvg-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826293" comment="qt5-qttools-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826294" comment="qt5-qttools-common-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826295" comment="qt5-qttools-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826296" comment="qt5-qttools-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826297" comment="qt5-qttools-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826298" comment="qt5-qttools-libs-designer-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826299" comment="qt5-qttools-libs-designercomponents-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826300" comment="qt5-qttools-libs-help-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826301" comment="qt5-qttools-static-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826302" comment="qt5-qttranslations-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826303" comment="qt5-qtwayland-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826304" comment="qt5-qtwayland-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826305" comment="qt5-qtwayland-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826306" comment="qt5-qtwayland-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826307" comment="qt5-qtwebchannel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826308" comment="qt5-qtwebchannel-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826309" comment="qt5-qtwebchannel-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826310" comment="qt5-qtwebchannel-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826311" comment="qt5-qtwebsockets-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826312" comment="qt5-qtwebsockets-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826313" comment="qt5-qtwebsockets-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826314" comment="qt5-qtwebsockets-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826315" comment="qt5-qtx11extras-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826316" comment="qt5-qtx11extras-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826317" comment="qt5-qtx11extras-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826318" comment="qt5-qtxmlpatterns-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826319" comment="qt5-qtxmlpatterns-devel-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826320" comment="qt5-qtxmlpatterns-doc-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826321" comment="qt5-qtxmlpatterns-examples-5.9.7-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826322" comment="qt5-rpm-macros-5.9.7-2.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:779" version="1" class="patch">
	<metadata>
		<title>security update for libssh2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2136.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2136.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3858">CVE-2019-3858 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3861">CVE-2019-3861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826323" comment="libssh2-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826324" comment="libssh2-devel-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826325" comment="libssh2-docs-1.8.0-3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:780" version="1" class="patch">
	<metadata>
		<title>security update for keycloak-httpd-client-install (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-15111" ref_url="https://www.suse.com/security/cve/CVE-2017-15111/" source="CVE"/>
		<reference ref_id="CVE-2017-15112" ref_url="https://www.suse.com/security/cve/CVE-2017-15112/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2137.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2137.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15111/">CVE-2017-15111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15111">CVE-2017-15111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15112/">CVE-2017-15112 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15112">CVE-2017-15112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826326" comment="keycloak-httpd-client-install-0.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826327" comment="python2-keycloak-httpd-client-install-0.8-1.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826326" comment="keycloak-httpd-client-install-0.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826327" comment="python2-keycloak-httpd-client-install-0.8-1.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:781" version="1" class="patch">
	<metadata>
		<title>security update for kde-settings (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-6790" ref_url="https://www.suse.com/security/cve/CVE-2018-6790/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2141.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2141.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6790/">CVE-2018-6790 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6790">CVE-2018-6790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826328" comment="kcm_colors-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826329" comment="kde-settings-19-23.9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826330" comment="kde-settings-ksplash-19-23.9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826331" comment="kde-settings-minimal-19-23.9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826332" comment="kde-settings-plasma-19-23.9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826333" comment="kde-settings-pulseaudio-19-23.9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826334" comment="kde-style-oxygen-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826335" comment="kde-workspace-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826336" comment="kde-workspace-devel-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826337" comment="kde-workspace-ksplash-themes-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826338" comment="kde-workspace-libs-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826339" comment="kdeclassic-cursor-theme-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826340" comment="kdelibs-4.14.8-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826341" comment="kdelibs-apidocs-4.14.8-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826342" comment="kdelibs-common-4.14.8-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826343" comment="kdelibs-devel-4.14.8-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826344" comment="kdelibs-ktexteditor-4.14.8-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826345" comment="kgreeter-plugins-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826346" comment="khotkeys-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826347" comment="khotkeys-libs-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826348" comment="kinfocenter-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826349" comment="kmag-4.10.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826350" comment="kmenuedit-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826351" comment="ksysguard-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826352" comment="ksysguard-libs-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826353" comment="ksysguardd-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826354" comment="kwin-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826355" comment="kwin-gles-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826356" comment="kwin-gles-libs-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826357" comment="kwin-libs-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826358" comment="libkworkspace-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826359" comment="oxygen-cursor-themes-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826360" comment="plasma-scriptengine-python-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826361" comment="plasma-scriptengine-ruby-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826362" comment="qt-settings-19-23.9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826363" comment="virtuoso-opensource-6.1.6-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826364" comment="virtuoso-opensource-utils-6.1.6-7.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826328" comment="kcm_colors-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826329" comment="kde-settings-19-23.9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826330" comment="kde-settings-ksplash-19-23.9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826331" comment="kde-settings-minimal-19-23.9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826332" comment="kde-settings-plasma-19-23.9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826333" comment="kde-settings-pulseaudio-19-23.9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826334" comment="kde-style-oxygen-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826335" comment="kde-workspace-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826336" comment="kde-workspace-devel-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826337" comment="kde-workspace-ksplash-themes-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826338" comment="kde-workspace-libs-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826339" comment="kdeclassic-cursor-theme-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826340" comment="kdelibs-4.14.8-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826341" comment="kdelibs-apidocs-4.14.8-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826342" comment="kdelibs-common-4.14.8-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826343" comment="kdelibs-devel-4.14.8-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826344" comment="kdelibs-ktexteditor-4.14.8-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826345" comment="kgreeter-plugins-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826346" comment="khotkeys-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826347" comment="khotkeys-libs-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826348" comment="kinfocenter-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826349" comment="kmag-4.10.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826350" comment="kmenuedit-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826351" comment="ksysguard-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826352" comment="ksysguard-libs-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826353" comment="ksysguardd-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826354" comment="kwin-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826355" comment="kwin-gles-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826356" comment="kwin-gles-libs-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826357" comment="kwin-libs-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826358" comment="libkworkspace-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826359" comment="oxygen-cursor-themes-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826360" comment="plasma-scriptengine-python-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826361" comment="plasma-scriptengine-ruby-4.11.19-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826362" comment="qt-settings-19-23.9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826363" comment="virtuoso-opensource-6.1.6-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826364" comment="virtuoso-opensource-utils-6.1.6-7.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:782" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2143.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2143.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15473">CVE-2018-15473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826365" comment="openssh-7.4p1-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826366" comment="openssh-askpass-7.4p1-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826367" comment="openssh-cavs-7.4p1-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826368" comment="openssh-clients-7.4p1-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826369" comment="openssh-keycat-7.4p1-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826370" comment="openssh-ldap-7.4p1-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826371" comment="openssh-server-7.4p1-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826372" comment="openssh-server-sysvinit-7.4p1-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826373" comment="pam_ssh_agent_auth-0.10.3-2.21.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:783" version="1" class="patch">
	<metadata>
		<title>security update for gvfs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-3827" ref_url="https://www.suse.com/security/cve/CVE-2019-3827/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2145.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2145.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3827/">CVE-2019-3827 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3827">CVE-2019-3827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826374" comment="gvfs-1.36.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826375" comment="gvfs-afc-1.36.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826376" comment="gvfs-afp-1.36.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826377" comment="gvfs-archive-1.36.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826378" comment="gvfs-client-1.36.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826379" comment="gvfs-devel-1.36.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826380" comment="gvfs-fuse-1.36.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826381" comment="gvfs-goa-1.36.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826382" comment="gvfs-gphoto2-1.36.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826383" comment="gvfs-mtp-1.36.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826384" comment="gvfs-smb-1.36.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826385" comment="gvfs-tests-1.36.2-3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:784" version="1" class="patch">
	<metadata>
		<title>security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16420" ref_url="https://www.suse.com/security/cve/CVE-2018-16420/" source="CVE"/>
		<reference ref_id="CVE-2018-16421" ref_url="https://www.suse.com/security/cve/CVE-2018-16421/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16426" ref_url="https://www.suse.com/security/cve/CVE-2018-16426/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2154.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2154.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16391">CVE-2018-16391 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16392">CVE-2018-16392 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16393">CVE-2018-16393 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16418">CVE-2018-16418 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16419">CVE-2018-16419 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16420/">CVE-2018-16420 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16420">CVE-2018-16420 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16421/">CVE-2018-16421 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16421">CVE-2018-16421 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16422">CVE-2018-16422 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16423">CVE-2018-16423 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16426/">CVE-2018-16426 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16426">CVE-2018-16426 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16427">CVE-2018-16427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826386" comment="opensc-0.19.0-3.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:785" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1000852" ref_url="https://www.suse.com/security/cve/CVE-2018-1000852/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2157.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2157.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000852/">CVE-2018-1000852 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000852">CVE-2018-1000852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826387" comment="freerdp-2.0.0-1.rc4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826388" comment="freerdp-devel-2.0.0-1.rc4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826389" comment="freerdp-libs-2.0.0-1.rc4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826390" comment="libwinpr-2.0.0-1.rc4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826391" comment="libwinpr-devel-2.0.0-1.rc4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826392" comment="vinagre-3.22.0-12.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:786" version="1" class="patch">
	<metadata>
		<title>security update for unzip (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18384" ref_url="https://www.suse.com/security/cve/CVE-2018-18384/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2159.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2159.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18384/">CVE-2018-18384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18384">CVE-2018-18384 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826393" comment="unzip-6.0-20.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:787" version="1" class="patch">
	<metadata>
		<title>security update for blktrace (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-10689" ref_url="https://www.suse.com/security/cve/CVE-2018-10689/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2162.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2162.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10689/">CVE-2018-10689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10689">CVE-2018-10689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826394" comment="blktrace-1.0.5-9.el7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826394" comment="blktrace-1.0.5-9.el7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:788" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5383" ref_url="https://www.suse.com/security/cve/CVE-2018-5383/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2169.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2169.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5383/">CVE-2018-5383 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5383">CVE-2018-5383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826395" comment="iwl100-firmware-39.31.5.1-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826396" comment="iwl1000-firmware-39.31.5.1-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826397" comment="iwl105-firmware-18.168.6.1-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826398" comment="iwl135-firmware-18.168.6.1-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826399" comment="iwl2000-firmware-18.168.6.1-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826400" comment="iwl2030-firmware-18.168.6.1-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826401" comment="iwl3160-firmware-22.0.7.0-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826402" comment="iwl3945-firmware-15.32.2.9-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826403" comment="iwl4965-firmware-228.61.2.24-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826404" comment="iwl5000-firmware-8.83.5.1_1-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826405" comment="iwl5150-firmware-8.24.2.2-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826406" comment="iwl6000-firmware-9.221.4.1-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826407" comment="iwl6000g2a-firmware-17.168.5.3-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826408" comment="iwl6000g2b-firmware-17.168.5.2-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826409" comment="iwl6050-firmware-41.28.5.1-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826410" comment="iwl7260-firmware-22.0.7.0-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826411" comment="iwl7265-firmware-22.0.7.0-72.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826412" comment="linux-firmware-20190429-72.gitddde598.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:789" version="1" class="patch">
	<metadata>
		<title>security update for sssd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-16838" ref_url="https://www.suse.com/security/cve/CVE-2018-16838/" source="CVE"/>
		<reference ref_id="CVE-2019-3811" ref_url="https://www.suse.com/security/cve/CVE-2019-3811/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2177.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2177.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16838/">CVE-2018-16838 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16838">CVE-2018-16838 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3811/">CVE-2019-3811 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3811">CVE-2019-3811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826413" comment="libipa_hbac-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826414" comment="libipa_hbac-devel-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826415" comment="libsss_autofs-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826416" comment="libsss_certmap-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826417" comment="libsss_certmap-devel-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826418" comment="libsss_idmap-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826419" comment="libsss_idmap-devel-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826420" comment="libsss_nss_idmap-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826421" comment="libsss_nss_idmap-devel-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826422" comment="libsss_simpleifp-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826423" comment="libsss_simpleifp-devel-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826424" comment="libsss_sudo-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826425" comment="python-libipa_hbac-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826426" comment="python-libsss_nss_idmap-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826427" comment="python-sss-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826428" comment="python-sss-murmur-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826429" comment="python-sssdconfig-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826430" comment="sssd-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826431" comment="sssd-ad-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826432" comment="sssd-client-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826433" comment="sssd-common-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826434" comment="sssd-common-pac-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826435" comment="sssd-dbus-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826436" comment="sssd-ipa-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826437" comment="sssd-kcm-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826438" comment="sssd-krb5-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826439" comment="sssd-krb5-common-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826440" comment="sssd-ldap-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826441" comment="sssd-libwbclient-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826442" comment="sssd-libwbclient-devel-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826443" comment="sssd-polkit-rules-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826444" comment="sssd-proxy-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826445" comment="sssd-tools-1.16.4-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826446" comment="sssd-winbind-idmap-1.16.4-21.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:790" version="1" class="patch">
	<metadata>
		<title>security update for udisks2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-17336" ref_url="https://www.suse.com/security/cve/CVE-2018-17336/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2178.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2178.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17336/">CVE-2018-17336 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17336">CVE-2018-17336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826447" comment="libudisks2-2.7.3-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826448" comment="libudisks2-devel-2.7.3-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826449" comment="udisks2-2.7.3-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826450" comment="udisks2-iscsi-2.7.3-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826451" comment="udisks2-lsm-2.7.3-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826452" comment="udisks2-lvm2-2.7.3-9.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:791" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2181.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2181.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16842">CVE-2018-16842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826453" comment="curl-7.29.0-54.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826454" comment="libcurl-7.29.0-54.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826455" comment="libcurl-devel-7.29.0-54.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:792" version="1" class="patch">
	<metadata>
		<title>security update for procps-ng (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2189.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2189.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1122">CVE-2018-1122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826456" comment="procps-ng-3.3.10-26.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826457" comment="procps-ng-devel-3.3.10-26.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826458" comment="procps-ng-i18n-3.3.10-26.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:793" version="1" class="patch">
	<metadata>
		<title>security update for zziplib (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-16548" ref_url="https://www.suse.com/security/cve/CVE-2018-16548/" source="CVE"/>
		<reference ref_id="CVE-2018-6541" ref_url="https://www.suse.com/security/cve/CVE-2018-6541/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2196.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2196.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16548/">CVE-2018-16548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16548">CVE-2018-16548 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6541/">CVE-2018-6541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6541">CVE-2018-6541 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826459" comment="zziplib-0.13.62-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826460" comment="zziplib-devel-0.13.62-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826461" comment="zziplib-utils-0.13.62-11.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:794" version="1" class="patch">
	<metadata>
		<title>security update for elfutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062/" source="CVE"/>
		<reference ref_id="CVE-2018-16402" ref_url="https://www.suse.com/security/cve/CVE-2018-16402/" source="CVE"/>
		<reference ref_id="CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403/" source="CVE"/>
		<reference ref_id="CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310/" source="CVE"/>
		<reference ref_id="CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520/" source="CVE"/>
		<reference ref_id="CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521/" source="CVE"/>
		<reference ref_id="CVE-2019-7149" ref_url="https://www.suse.com/security/cve/CVE-2019-7149/" source="CVE"/>
		<reference ref_id="CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150/" source="CVE"/>
		<reference ref_id="CVE-2019-7664" ref_url="https://www.suse.com/security/cve/CVE-2019-7664/" source="CVE"/>
		<reference ref_id="CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2197.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2197.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16062">CVE-2018-16062 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16402/">CVE-2018-16402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16402">CVE-2018-16402 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16403">CVE-2018-16403 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18310">CVE-2018-18310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18520">CVE-2018-18520 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18521">CVE-2018-18521 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7149/">CVE-2019-7149 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7149">CVE-2019-7149 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7150">CVE-2019-7150 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7664/">CVE-2019-7664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7664">CVE-2019-7664 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7665">CVE-2019-7665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826462" comment="elfutils-0.176-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826463" comment="elfutils-default-yama-scope-0.176-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826464" comment="elfutils-devel-0.176-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826465" comment="elfutils-devel-static-0.176-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826466" comment="elfutils-libelf-0.176-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826467" comment="elfutils-libelf-devel-0.176-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826468" comment="elfutils-libelf-devel-static-0.176-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826469" comment="elfutils-libs-0.176-2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:795" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1304" ref_url="https://www.suse.com/security/cve/CVE-2018-1304/" source="CVE"/>
		<reference ref_id="CVE-2018-1305" ref_url="https://www.suse.com/security/cve/CVE-2018-1305/" source="CVE"/>
		<reference ref_id="CVE-2018-8014" ref_url="https://www.suse.com/security/cve/CVE-2018-8014/" source="CVE"/>
		<reference ref_id="CVE-2018-8034" ref_url="https://www.suse.com/security/cve/CVE-2018-8034/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2205.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2205.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1304/">CVE-2018-1304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1304">CVE-2018-1304 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1305/">CVE-2018-1305 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1305">CVE-2018-1305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8014/">CVE-2018-8014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8014">CVE-2018-8014 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8034/">CVE-2018-8034 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8034">CVE-2018-8034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826470" comment="tomcat-7.0.76-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826471" comment="tomcat-admin-webapps-7.0.76-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826472" comment="tomcat-docs-webapp-7.0.76-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826473" comment="tomcat-el-2.2-api-7.0.76-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826474" comment="tomcat-javadoc-7.0.76-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826475" comment="tomcat-jsp-2.2-api-7.0.76-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826476" comment="tomcat-jsvc-7.0.76-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826477" comment="tomcat-lib-7.0.76-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826478" comment="tomcat-servlet-3.0-api-7.0.76-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826479" comment="tomcat-webapps-7.0.76-9.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:796" version="1" class="patch">
	<metadata>
		<title>security update for libgovirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2229.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2229.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10893">CVE-2018-10893 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826480" comment="libgovirt-0.3.4-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826481" comment="libgovirt-devel-0.3.4-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826482" comment="spice-glib-0.35-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826483" comment="spice-glib-devel-0.35-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826484" comment="spice-gtk-tools-0.35-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826485" comment="spice-gtk3-0.35-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826486" comment="spice-gtk3-devel-0.35-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826487" comment="spice-gtk3-vala-0.35-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826488" comment="spice-vdagent-0.14.0-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826489" comment="virt-viewer-5.0-15.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826480" comment="libgovirt-0.3.4-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826481" comment="libgovirt-devel-0.3.4-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826482" comment="spice-glib-0.35-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826483" comment="spice-glib-devel-0.35-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826484" comment="spice-gtk-tools-0.35-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826485" comment="spice-gtk3-0.35-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826486" comment="spice-gtk3-devel-0.35-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826487" comment="spice-gtk3-vala-0.35-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826488" comment="spice-vdagent-0.14.0-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826489" comment="virt-viewer-5.0-15.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:797" version="1" class="patch">
	<metadata>
		<title>security update for nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2237.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2237.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12404">CVE-2018-12404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826490" comment="nspr-4.21.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826491" comment="nspr-devel-4.21.0-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826492" comment="nss-3.44.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826493" comment="nss-devel-3.44.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826494" comment="nss-pkcs11-devel-3.44.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826495" comment="nss-softokn-3.44.0-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826496" comment="nss-softokn-devel-3.44.0-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826497" comment="nss-softokn-freebl-3.44.0-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826498" comment="nss-softokn-freebl-devel-3.44.0-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826499" comment="nss-sysinit-3.44.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826500" comment="nss-tools-3.44.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826501" comment="nss-util-3.44.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826502" comment="nss-util-devel-3.44.0-3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:798" version="1" class="patch">
	<metadata>
		<title>security update for http-parser (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-12121" ref_url="https://www.suse.com/security/cve/CVE-2018-12121/" source="CVE"/>
		<reference ref_id="CVE-2018-7159" ref_url="https://www.suse.com/security/cve/CVE-2018-7159/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2258.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2258.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12121/">CVE-2018-12121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12121">CVE-2018-12121 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7159/">CVE-2018-7159 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7159">CVE-2018-7159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826503" comment="http-parser-2.7.1-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826504" comment="http-parser-devel-2.7.1-8.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:799" version="1" class="patch">
	<metadata>
		<title>security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2272.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2272.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826505" comment="python-urllib3-1.10.2-7.el7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826505" comment="python-urllib3-1.10.2-7.el7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:800" version="1" class="patch">
	<metadata>
		<title>security update for mercurial (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1000132" ref_url="https://www.suse.com/security/cve/CVE-2018-1000132/" source="CVE"/>
		<reference ref_id="CVE-2018-13346" ref_url="https://www.suse.com/security/cve/CVE-2018-13346/" source="CVE"/>
		<reference ref_id="CVE-2018-13347" ref_url="https://www.suse.com/security/cve/CVE-2018-13347/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2276.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2276.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000132/">CVE-2018-1000132 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000132">CVE-2018-1000132 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13346/">CVE-2018-13346 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13346">CVE-2018-13346 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13347/">CVE-2018-13347 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13347">CVE-2018-13347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826506" comment="emacs-mercurial-2.6.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826507" comment="emacs-mercurial-el-2.6.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826508" comment="mercurial-2.6.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826509" comment="mercurial-hgk-2.6.2-10.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:801" version="1" class="patch">
	<metadata>
		<title>security update for uriparser (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-19198" ref_url="https://www.suse.com/security/cve/CVE-2018-19198/" source="CVE"/>
		<reference ref_id="CVE-2018-19199" ref_url="https://www.suse.com/security/cve/CVE-2018-19199/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2280.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2280.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19198/">CVE-2018-19198 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19198">CVE-2018-19198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19199/">CVE-2018-19199 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19199">CVE-2018-19199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826510" comment="uriparser-0.7.5-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826511" comment="uriparser-devel-0.7.5-10.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826510" comment="uriparser-0.7.5-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826511" comment="uriparser-devel-0.7.5-10.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:802" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-11645" ref_url="https://www.suse.com/security/cve/CVE-2018-11645/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2281.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2281.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11645/">CVE-2018-11645 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11645">CVE-2018-11645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826512" comment="ghostscript-9.25-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826513" comment="ghostscript-cups-9.25-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826514" comment="ghostscript-doc-9.25-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826515" comment="ghostscript-gtk-9.25-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826516" comment="libgs-9.25-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826517" comment="libgs-devel-9.25-2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:803" version="1" class="patch">
	<metadata>
		<title>security update for sox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-18189" ref_url="https://www.suse.com/security/cve/CVE-2017-18189/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2283.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2283.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18189/">CVE-2017-18189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18189">CVE-2017-18189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826518" comment="sox-14.4.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826519" comment="sox-devel-14.4.1-7.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826518" comment="sox-14.4.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826519" comment="sox-devel-14.4.1-7.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:804" version="1" class="patch">
	<metadata>
		<title>security update for keepalived (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-19044" ref_url="https://www.suse.com/security/cve/CVE-2018-19044/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2285.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2285.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19044/">CVE-2018-19044 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19044">CVE-2018-19044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826520" comment="keepalived-1.3.5-16.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:805" version="1" class="patch">
	<metadata>
		<title>security update for libsolv (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2290.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2290.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826521" comment="libsolv-0.6.34-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826522" comment="libsolv-demo-0.6.34-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826523" comment="libsolv-devel-0.6.34-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826524" comment="libsolv-tools-0.6.34-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826525" comment="python2-solv-0.6.34-4.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826521" comment="libsolv-0.6.34-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826522" comment="libsolv-demo-0.6.34-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826523" comment="libsolv-devel-0.6.34-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826524" comment="libsolv-tools-0.6.34-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826525" comment="python2-solv-0.6.34-4.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:806" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-3840" ref_url="https://www.suse.com/security/cve/CVE-2019-3840/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2294.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2294.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3840/">CVE-2019-3840 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3840">CVE-2019-3840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826526" comment="libvirt-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826527" comment="libvirt-admin-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826528" comment="libvirt-bash-completion-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826529" comment="libvirt-client-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826530" comment="libvirt-daemon-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826531" comment="libvirt-daemon-config-network-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826532" comment="libvirt-daemon-config-nwfilter-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826533" comment="libvirt-daemon-driver-interface-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826534" comment="libvirt-daemon-driver-lxc-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826535" comment="libvirt-daemon-driver-network-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826536" comment="libvirt-daemon-driver-nodedev-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826537" comment="libvirt-daemon-driver-nwfilter-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826538" comment="libvirt-daemon-driver-qemu-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826539" comment="libvirt-daemon-driver-secret-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826540" comment="libvirt-daemon-driver-storage-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826541" comment="libvirt-daemon-driver-storage-core-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826542" comment="libvirt-daemon-driver-storage-disk-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826543" comment="libvirt-daemon-driver-storage-gluster-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826544" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826545" comment="libvirt-daemon-driver-storage-logical-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826546" comment="libvirt-daemon-driver-storage-mpath-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826547" comment="libvirt-daemon-driver-storage-rbd-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826548" comment="libvirt-daemon-driver-storage-scsi-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826549" comment="libvirt-daemon-kvm-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826550" comment="libvirt-daemon-lxc-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826551" comment="libvirt-devel-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826552" comment="libvirt-docs-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826553" comment="libvirt-libs-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826554" comment="libvirt-lock-sanlock-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826555" comment="libvirt-login-shell-4.5.0-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826556" comment="libvirt-nss-4.5.0-23.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:807" version="1" class="patch">
	<metadata>
		<title>security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503/" source="CVE"/>
		<reference ref_id="CVE-2018-1000877" ref_url="https://www.suse.com/security/cve/CVE-2018-1000877/" source="CVE"/>
		<reference ref_id="CVE-2018-1000878" ref_url="https://www.suse.com/security/cve/CVE-2018-1000878/" source="CVE"/>
		<reference ref_id="CVE-2019-1000019" ref_url="https://www.suse.com/security/cve/CVE-2019-1000019/" source="CVE"/>
		<reference ref_id="CVE-2019-1000020" ref_url="https://www.suse.com/security/cve/CVE-2019-1000020/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2298.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2298.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14503">CVE-2017-14503 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000877/">CVE-2018-1000877 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000877">CVE-2018-1000877 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000878/">CVE-2018-1000878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000878">CVE-2018-1000878 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000019/">CVE-2019-1000019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000019">CVE-2019-1000019 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000020/">CVE-2019-1000020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1000020">CVE-2019-1000020 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826557" comment="bsdcpio-3.1.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826558" comment="bsdtar-3.1.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826559" comment="libarchive-3.1.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826560" comment="libarchive-devel-3.1.2-12.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:808" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2304.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2304.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1559">CVE-2019-1559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826561" comment="openssl-1.0.2k-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826562" comment="openssl-devel-1.0.2k-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826563" comment="openssl-libs-1.0.2k-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826564" comment="openssl-perl-1.0.2k-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826565" comment="openssl-static-1.0.2k-19.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:809" version="1" class="patch">
	<metadata>
		<title>security update for libguestfs-winsupport (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-9755" ref_url="https://www.suse.com/security/cve/CVE-2019-9755/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2308.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2308.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9755/">CVE-2019-9755 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9755">CVE-2019-9755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826566" comment="libguestfs-winsupport-7.2-3.el7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826566" comment="libguestfs-winsupport-7.2-3.el7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:810" version="1" class="patch">
	<metadata>
		<title>security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3081" ref_url="https://www.suse.com/security/cve/CVE-2018-3081/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2019-2503" ref_url="https://www.suse.com/security/cve/CVE-2019-2503/" source="CVE"/>
		<reference ref_id="CVE-2019-2529" ref_url="https://www.suse.com/security/cve/CVE-2019-2529/" source="CVE"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2327.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2327.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3058">CVE-2018-3058 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3063">CVE-2018-3063 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3066">CVE-2018-3066 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3081/">CVE-2018-3081 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3081">CVE-2018-3081 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3282">CVE-2018-3282 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2503/">CVE-2019-2503 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2503">CVE-2019-2503 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2529/">CVE-2019-2529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2529">CVE-2019-2529 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2614">CVE-2019-2614 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2627">CVE-2019-2627 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826567" comment="mariadb-5.5.64-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826568" comment="mariadb-bench-5.5.64-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826569" comment="mariadb-devel-5.5.64-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826570" comment="mariadb-embedded-5.5.64-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826571" comment="mariadb-embedded-devel-5.5.64-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826572" comment="mariadb-libs-5.5.64-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826573" comment="mariadb-server-5.5.64-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826574" comment="mariadb-test-5.5.64-1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:811" version="1" class="patch">
	<metadata>
		<title>security update for advancecomp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-8379" ref_url="https://www.suse.com/security/cve/CVE-2019-8379/" source="CVE"/>
		<reference ref_id="CVE-2019-8383" ref_url="https://www.suse.com/security/cve/CVE-2019-8383/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2332.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2332.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8379/">CVE-2019-8379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8379">CVE-2019-8379 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8383/">CVE-2019-8383 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8383">CVE-2019-8383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826575" comment="advancecomp-1.15-21.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:812" version="1" class="patch">
	<metadata>
		<title>security update for unixODBC (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-7409" ref_url="https://www.suse.com/security/cve/CVE-2018-7409/" source="CVE"/>
		<reference ref_id="CVE-2018-7485" ref_url="https://www.suse.com/security/cve/CVE-2018-7485/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2336.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2336.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7409/">CVE-2018-7409 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7409">CVE-2018-7409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-7485/">CVE-2018-7485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7485">CVE-2018-7485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826576" comment="unixODBC-2.3.1-14.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826577" comment="unixODBC-devel-2.3.1-14.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826576" comment="unixODBC-2.3.1-14.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826577" comment="unixODBC-devel-2.3.1-14.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:813" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217/" source="CVE"/>
		<reference ref_id="CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2343.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2343.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0217">CVE-2019-0217 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0220">CVE-2019-0220 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826578" comment="httpd-2.4.6-90.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826579" comment="httpd-devel-2.4.6-90.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826580" comment="httpd-manual-2.4.6-90.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826581" comment="httpd-tools-2.4.6-90.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826582" comment="mod_ldap-2.4.6-90.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826583" comment="mod_proxy_html-2.4.6-90.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826584" comment="mod_session-2.4.6-90.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826585" comment="mod_ssl-2.4.6-90.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:814" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-10216" ref_url="https://www.suse.com/security/cve/CVE-2019-10216/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2462.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2462.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10216/">CVE-2019-10216 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10216">CVE-2019-10216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826586" comment="ghostscript-9.25-2.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826587" comment="ghostscript-cups-9.25-2.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826588" comment="ghostscript-doc-9.25-2.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826589" comment="ghostscript-gtk-9.25-2.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826590" comment="libgs-9.25-2.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826591" comment="libgs-devel-9.25-2.el7_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:815" version="1" class="patch">
	<metadata>
		<title>security update for pango (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-1010238" ref_url="https://www.suse.com/security/cve/CVE-2019-1010238/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2571.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2571.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010238/">CVE-2019-1010238 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010238">CVE-2019-1010238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826592" comment="pango-1.42.4-4.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826593" comment="pango-devel-1.42.4-4.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826594" comment="pango-tests-1.42.4-4.el7_7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826592" comment="pango-1.42.4-4.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826593" comment="pango-devel-1.42.4-4.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826594" comment="pango-tests-1.42.4-4.el7_7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:816" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2586.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2586.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14811">CVE-2019-14811 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14812">CVE-2019-14812 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14813">CVE-2019-14813 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14817">CVE-2019-14817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826595" comment="ghostscript-9.25-2.el7_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826596" comment="ghostscript-cups-9.25-2.el7_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826597" comment="ghostscript-doc-9.25-2.el7_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826598" comment="ghostscript-gtk-9.25-2.el7_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826599" comment="libgs-9.25-2.el7_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826600" comment="libgs-devel-9.25-2.el7_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:817" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-9500" ref_url="https://www.suse.com/security/cve/CVE-2019-9500/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2600.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2600.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1125">CVE-2019-1125 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9500/">CVE-2019-9500 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9500">CVE-2019-9500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826601" comment="bpftool-3.10.0-1062.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826602" comment="kernel-3.10.0-1062.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826603" comment="kernel-abi-whitelists-3.10.0-1062.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826604" comment="kernel-debug-3.10.0-1062.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826607" comment="kernel-doc-3.10.0-1062.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826608" comment="kernel-headers-3.10.0-1062.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826609" comment="kernel-tools-3.10.0-1062.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826610" comment="kernel-tools-libs-3.10.0-1062.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826612" comment="perf-3.10.0-1062.1.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826613" comment="python-perf-3.10.0-1062.1.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:818" version="1" class="patch">
	<metadata>
		<title>security update for kde-settings (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-14744" ref_url="https://www.suse.com/security/cve/CVE-2019-14744/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2606.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2606.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14744/">CVE-2019-14744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14744">CVE-2019-14744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826614" comment="kde-settings-19-23.10.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826615" comment="kde-settings-ksplash-19-23.10.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826616" comment="kde-settings-minimal-19-23.10.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826617" comment="kde-settings-plasma-19-23.10.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826618" comment="kde-settings-pulseaudio-19-23.10.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826619" comment="kdelibs-4.14.8-11.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826620" comment="kdelibs-apidocs-4.14.8-11.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826621" comment="kdelibs-common-4.14.8-11.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826622" comment="kdelibs-devel-4.14.8-11.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826623" comment="kdelibs-ktexteditor-4.14.8-11.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826624" comment="qt-settings-19-23.10.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:819" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2607.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2607.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12155">CVE-2019-12155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826625" comment="qemu-img-1.5.3-167.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826626" comment="qemu-kvm-1.5.3-167.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826627" comment="qemu-kvm-common-1.5.3-167.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826628" comment="qemu-kvm-tools-1.5.3-167.el7_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:820" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2729.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2729.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11733">CVE-2019-11733 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826629" comment="firefox-60.9.0-1.el7_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:821" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11739" ref_url="https://www.suse.com/security/cve/CVE-2019-11739/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2773.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2773.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11739/">CVE-2019-11739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11739">CVE-2019-11739 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826630" comment="thunderbird-60.9.0-1.el7_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:822" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2829.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2829.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14835">CVE-2019-14835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826631" comment="bpftool-3.10.0-1062.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826632" comment="kernel-3.10.0-1062.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826633" comment="kernel-abi-whitelists-3.10.0-1062.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826634" comment="kernel-debug-3.10.0-1062.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826637" comment="kernel-doc-3.10.0-1062.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826638" comment="kernel-headers-3.10.0-1062.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826639" comment="kernel-tools-3.10.0-1062.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826640" comment="kernel-tools-libs-3.10.0-1062.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826642" comment="perf-3.10.0-1062.1.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826643" comment="python-perf-3.10.0-1062.1.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:823" version="1" class="patch">
	<metadata>
		<title>security update for dovecot (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2836.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2836.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11500">CVE-2019-11500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826644" comment="dovecot-2.2.36-3.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826645" comment="dovecot-devel-2.2.36-3.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826646" comment="dovecot-mysql-2.2.36-3.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826647" comment="dovecot-pgsql-2.2.36-3.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826648" comment="dovecot-pigeonhole-2.2.36-3.el7_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:824" version="1" class="patch">
	<metadata>
		<title>security update for patch (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-20969" ref_url="https://www.suse.com/security/cve/CVE-2018-20969/" source="CVE"/>
		<reference ref_id="CVE-2019-13638" ref_url="https://www.suse.com/security/cve/CVE-2019-13638/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:2964.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:2964.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20969/">CVE-2018-20969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20969">CVE-2018-20969 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13638/">CVE-2019-13638 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13638">CVE-2019-13638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826649" comment="patch-2.7.1-12.el7_7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826649" comment="patch-2.7.1-12.el7_7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:825" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856/" source="CVE"/>
		<reference ref_id="CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3055.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3055.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20856">CVE-2018-20856 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10126">CVE-2019-10126 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3846">CVE-2019-3846 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9506">CVE-2019-9506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826650" comment="bpftool-3.10.0-1062.4.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826651" comment="kernel-3.10.0-1062.4.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826652" comment="kernel-abi-whitelists-3.10.0-1062.4.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826653" comment="kernel-debug-3.10.0-1062.4.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826656" comment="kernel-doc-3.10.0-1062.4.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826657" comment="kernel-headers-3.10.0-1062.4.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826658" comment="kernel-tools-3.10.0-1062.4.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826659" comment="kernel-tools-libs-3.10.0-1062.4.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826661" comment="perf-3.10.0-1062.4.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826662" comment="python-perf-3.10.0-1062.4.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:826" version="1" class="patch">
	<metadata>
		<title>security update for jss (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-14823" ref_url="https://www.suse.com/security/cve/CVE-2019-14823/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3067.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3067.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14823/">CVE-2019-14823 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14823">CVE-2019-14823 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826663" comment="jss-4.4.6-3.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826664" comment="jss-javadoc-4.4.6-3.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:827" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2977" ref_url="https://www.suse.com/security/cve/CVE-2019-2977/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3127.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3127.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2975">CVE-2019-2975 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2977/">CVE-2019-2977 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2977">CVE-2019-2977 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826665" comment="java-11-openjdk-11.0.5.10-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826666" comment="java-11-openjdk-debug-11.0.5.10-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826667" comment="java-11-openjdk-demo-11.0.5.10-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826668" comment="java-11-openjdk-demo-debug-11.0.5.10-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826669" comment="java-11-openjdk-devel-11.0.5.10-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826670" comment="java-11-openjdk-devel-debug-11.0.5.10-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826671" comment="java-11-openjdk-headless-11.0.5.10-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826672" comment="java-11-openjdk-headless-debug-11.0.5.10-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826673" comment="java-11-openjdk-javadoc-11.0.5.10-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826674" comment="java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826675" comment="java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826676" comment="java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826677" comment="java-11-openjdk-jmods-11.0.5.10-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826678" comment="java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826679" comment="java-11-openjdk-src-11.0.5.10-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826680" comment="java-11-openjdk-src-debug-11.0.5.10-0.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:828" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3128.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3128.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2949">CVE-2019-2949 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2975">CVE-2019-2975 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826681" comment="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826682" comment="java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826683" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826684" comment="java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826685" comment="java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826686" comment="java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826687" comment="java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826688" comment="java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826689" comment="java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826690" comment="java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826691" comment="java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826692" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826693" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826694" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826695" comment="java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826696" comment="java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:829" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3157.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3157.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2945">CVE-2019-2945 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2962">CVE-2019-2962 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2964">CVE-2019-2964 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2973">CVE-2019-2973 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2978">CVE-2019-2978 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2981">CVE-2019-2981 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2983">CVE-2019-2983 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2987">CVE-2019-2987 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2988">CVE-2019-2988 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2989">CVE-2019-2989 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2992">CVE-2019-2992 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2999">CVE-2019-2999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826697" comment="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826698" comment="java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826699" comment="java-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826700" comment="java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826701" comment="java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826702" comment="java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826703" comment="java-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:830" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3193.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3193.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826704" comment="firefox-68.2.0-1.el7_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:831" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3197.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3197.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826705" comment="sudo-1.8.23-4.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826706" comment="sudo-devel-1.8.23-4.el7_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:832" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3210.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3210.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11757">CVE-2019-11757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11758">CVE-2019-11758 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11759">CVE-2019-11759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11760">CVE-2019-11760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11761">CVE-2019-11761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11762">CVE-2019-11762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11763">CVE-2019-11763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11764">CVE-2019-11764 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826707" comment="thunderbird-68.2.0-1.el7_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:833" version="1" class="patch">
	<metadata>
		<title>security update for php (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11043" ref_url="https://www.suse.com/security/cve/CVE-2019-11043/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3286.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3286.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11043/">CVE-2019-11043 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11043">CVE-2019-11043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826708" comment="php-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826709" comment="php-bcmath-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826710" comment="php-cli-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826711" comment="php-common-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826712" comment="php-dba-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826713" comment="php-devel-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826714" comment="php-embedded-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826715" comment="php-enchant-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826716" comment="php-fpm-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826717" comment="php-gd-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826718" comment="php-intl-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826719" comment="php-ldap-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826720" comment="php-mbstring-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826721" comment="php-mysql-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826722" comment="php-mysqlnd-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826723" comment="php-odbc-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826724" comment="php-pdo-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826725" comment="php-pgsql-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826726" comment="php-process-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826727" comment="php-pspell-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826728" comment="php-recode-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826729" comment="php-snmp-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826730" comment="php-soap-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826731" comment="php-xml-5.4.16-46.1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826732" comment="php-xmlrpc-5.4.16-46.1.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:834" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3834.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3834.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0154">CVE-2019-0154 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826733" comment="bpftool-3.10.0-1062.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826734" comment="kernel-3.10.0-1062.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826735" comment="kernel-abi-whitelists-3.10.0-1062.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826736" comment="kernel-debug-3.10.0-1062.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826739" comment="kernel-doc-3.10.0-1062.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826740" comment="kernel-headers-3.10.0-1062.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826741" comment="kernel-tools-3.10.0-1062.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826742" comment="kernel-tools-libs-3.10.0-1062.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826744" comment="perf-3.10.0-1062.4.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826745" comment="python-perf-3.10.0-1062.4.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:835" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3872.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3872.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0155">CVE-2019-0155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826746" comment="bpftool-3.10.0-1062.4.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826747" comment="kernel-3.10.0-1062.4.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826748" comment="kernel-abi-whitelists-3.10.0-1062.4.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826749" comment="kernel-debug-3.10.0-1062.4.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826752" comment="kernel-doc-3.10.0-1062.4.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826753" comment="kernel-headers-3.10.0-1062.4.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826754" comment="kernel-tools-3.10.0-1062.4.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826755" comment="kernel-tools-libs-3.10.0-1062.4.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826757" comment="perf-3.10.0-1062.4.3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826758" comment="python-perf-3.10.0-1062.4.3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:836" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3888.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3888.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14869">CVE-2019-14869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826759" comment="ghostscript-9.25-2.el7_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826760" comment="ghostscript-cups-9.25-2.el7_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826761" comment="ghostscript-doc-9.25-2.el7_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826762" comment="ghostscript-gtk-9.25-2.el7_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826763" comment="libgs-9.25-2.el7_7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826764" comment="libgs-devel-9.25-2.el7_7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:837" version="1" class="patch">
	<metadata>
		<title>security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3950.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3950.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13616">CVE-2019-13616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826765" comment="SDL-1.2.15-14.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826766" comment="SDL-devel-1.2.15-14.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826767" comment="SDL-static-1.2.15-14.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:838" version="1" class="patch">
	<metadata>
		<title>security update for tcpdump (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-19519" ref_url="https://www.suse.com/security/cve/CVE-2018-19519/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3976.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3976.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19519/">CVE-2018-19519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19519">CVE-2018-19519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826768" comment="tcpdump-4.9.2-4.el7_7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826768" comment="tcpdump-4.9.2-4.el7_7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:839" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3979.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3979.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14821">CVE-2019-14821 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15239">CVE-2019-15239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826769" comment="bpftool-3.10.0-1062.7.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826770" comment="kernel-3.10.0-1062.7.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826771" comment="kernel-abi-whitelists-3.10.0-1062.7.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826772" comment="kernel-debug-3.10.0-1062.7.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826775" comment="kernel-doc-3.10.0-1062.7.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826776" comment="kernel-headers-3.10.0-1062.7.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826777" comment="kernel-tools-3.10.0-1062.7.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826778" comment="kernel-tools-libs-3.10.0-1062.7.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826780" comment="perf-3.10.0-1062.7.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826781" comment="python-perf-3.10.0-1062.7.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:840" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-14824" ref_url="https://www.suse.com/security/cve/CVE-2019-14824/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:3981.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:3981.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14824/">CVE-2019-14824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14824">CVE-2019-14824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826782" comment="389-ds-base-1.3.9.1-12.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826783" comment="389-ds-base-devel-1.3.9.1-12.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826784" comment="389-ds-base-libs-1.3.9.1-12.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826785" comment="389-ds-base-snmp-1.3.9.1-12.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:841" version="1" class="patch">
	<metadata>
		<title>security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-14906" ref_url="https://www.suse.com/security/cve/CVE-2019-14906/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:4024.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:4024.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14906/">CVE-2019-14906 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14906">CVE-2019-14906 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826786" comment="SDL-1.2.15-15.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826787" comment="SDL-devel-1.2.15-15.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826788" comment="SDL-static-1.2.15-15.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:842" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:4107.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:4107.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826789" comment="firefox-68.3.0-1.el7_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:843" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:4148.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:4148.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17005">CVE-2019-17005 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17008">CVE-2019-17008 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17010">CVE-2019-17010 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17011">CVE-2019-17011 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17012">CVE-2019-17012 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826790" comment="thunderbird-68.3.0-1.el7_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:844" version="1" class="patch">
	<metadata>
		<title>security update for nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:4190.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:4190.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11729">CVE-2019-11729 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826791" comment="nss-3.44.0-7.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826792" comment="nss-devel-3.44.0-7.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826793" comment="nss-softokn-3.44.0-8.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826794" comment="nss-softokn-devel-3.44.0-8.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826795" comment="nss-softokn-freebl-3.44.0-8.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826796" comment="nss-softokn-freebl-devel-3.44.0-8.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826797" comment="nss-sysinit-3.44.0-7.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826798" comment="nss-tools-3.44.0-7.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826799" comment="nss-util-3.44.0-4.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826800" comment="nss-util-devel-3.44.0-4.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:845" version="1" class="patch">
	<metadata>
		<title>security update for openslp (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-5544" ref_url="https://www.suse.com/security/cve/CVE-2019-5544/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:4240.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:4240.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5544/">CVE-2019-5544 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5544">CVE-2019-5544 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826801" comment="openslp-2.0.0-8.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826802" comment="openslp-devel-2.0.0-8.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826803" comment="openslp-server-2.0.0-8.el7_7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826801" comment="openslp-2.0.0-8.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826802" comment="openslp-devel-2.0.0-8.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826803" comment="openslp-server-2.0.0-8.el7_7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:846" version="1" class="patch">
	<metadata>
		<title>security update for fribidi (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-18397" ref_url="https://www.suse.com/security/cve/CVE-2019-18397/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2019:4326.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2019:4326.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18397/">CVE-2019-18397 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18397">CVE-2019-18397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826804" comment="fribidi-1.0.2-1.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826805" comment="fribidi-devel-1.0.2-1.el7_7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826804" comment="fribidi-1.0.2-1.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826805" comment="fribidi-devel-1.0.2-1.el7_7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:847" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0085.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0085.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826806" comment="firefox-68.4.1-1.el7_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:848" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0120.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0120.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17016">CVE-2019-17016 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17017">CVE-2019-17017 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17022">CVE-2019-17022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17024">CVE-2019-17024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17026">CVE-2019-17026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826807" comment="thunderbird-68.4.1-2.el7_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:849" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2655" ref_url="https://www.suse.com/security/cve/CVE-2020-2655/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0122.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0122.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2655/">CVE-2020-2655 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2655">CVE-2020-2655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826808" comment="java-11-openjdk-11.0.6.10-1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826809" comment="java-11-openjdk-debug-11.0.6.10-1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826810" comment="java-11-openjdk-demo-11.0.6.10-1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826811" comment="java-11-openjdk-demo-debug-11.0.6.10-1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826812" comment="java-11-openjdk-devel-11.0.6.10-1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826813" comment="java-11-openjdk-devel-debug-11.0.6.10-1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826814" comment="java-11-openjdk-headless-11.0.6.10-1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826815" comment="java-11-openjdk-headless-debug-11.0.6.10-1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826816" comment="java-11-openjdk-javadoc-11.0.6.10-1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826817" comment="java-11-openjdk-javadoc-debug-11.0.6.10-1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826818" comment="java-11-openjdk-javadoc-zip-11.0.6.10-1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826819" comment="java-11-openjdk-javadoc-zip-debug-11.0.6.10-1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826820" comment="java-11-openjdk-jmods-11.0.6.10-1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826821" comment="java-11-openjdk-jmods-debug-11.0.6.10-1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826822" comment="java-11-openjdk-src-11.0.6.10-1.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826823" comment="java-11-openjdk-src-debug-11.0.6.10-1.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:850" version="1" class="patch">
	<metadata>
		<title>security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0124.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0124.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1387">CVE-2019-1387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826824" comment="emacs-git-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826825" comment="emacs-git-el-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826826" comment="git-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826827" comment="git-all-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826828" comment="git-bzr-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826829" comment="git-cvs-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826830" comment="git-daemon-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826831" comment="git-email-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826832" comment="git-gnome-keyring-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826833" comment="git-gui-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826834" comment="git-hg-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826835" comment="git-instaweb-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826836" comment="git-p4-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826837" comment="git-svn-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826838" comment="gitk-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826839" comment="gitweb-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826840" comment="perl-Git-1.8.3.1-21.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826841" comment="perl-Git-SVN-1.8.3.1-21.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:851" version="1" class="patch">
	<metadata>
		<title>security update for apache-commons-beanutils (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-10086" ref_url="https://www.suse.com/security/cve/CVE-2019-10086/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0194.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0194.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10086/">CVE-2019-10086 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10086">CVE-2019-10086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826842" comment="apache-commons-beanutils-1.8.3-15.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826843" comment="apache-commons-beanutils-javadoc-1.8.3-15.el7_7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826842" comment="apache-commons-beanutils-1.8.3-15.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826843" comment="apache-commons-beanutils-javadoc-1.8.3-15.el7_7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:852" version="1" class="patch">
	<metadata>
		<title>security update for python-reportlab (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-17626" ref_url="https://www.suse.com/security/cve/CVE-2019-17626/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0195.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0195.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-17626/">CVE-2019-17626 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17626">CVE-2019-17626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826844" comment="python-reportlab-2.5-9.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826845" comment="python-reportlab-docs-2.5-9.el7_7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:853" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0196.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0196.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826846" comment="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826847" comment="java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826848" comment="java-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826849" comment="java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826850" comment="java-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826851" comment="java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826852" comment="java-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826853" comment="java-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826854" comment="java-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826855" comment="java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826856" comment="java-1.8.0-openjdk-javadoc-1.8.0.242.b08-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826857" comment="java-1.8.0-openjdk-javadoc-debug-1.8.0.242.b08-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826858" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.242.b08-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826859" comment="java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.242.b08-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826860" comment="java-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826861" comment="java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:854" version="1" class="patch">
	<metadata>
		<title>security update for libarchive (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-18408" ref_url="https://www.suse.com/security/cve/CVE-2019-18408/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0203.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0203.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18408/">CVE-2019-18408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-18408">CVE-2019-18408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826862" comment="bsdcpio-3.1.2-14.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826863" comment="bsdtar-3.1.2-14.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826864" comment="libarchive-3.1.2-14.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826865" comment="libarchive-devel-3.1.2-14.el7_7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826862" comment="bsdcpio-3.1.2-14.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826863" comment="bsdtar-3.1.2-14.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826864" comment="libarchive-3.1.2-14.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826865" comment="libarchive-devel-3.1.2-14.el7_7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:855" version="1" class="patch">
	<metadata>
		<title>security update for lemon (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-13734" ref_url="https://www.suse.com/security/cve/CVE-2019-13734/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0227.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0227.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13734/">CVE-2019-13734 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13734">CVE-2019-13734 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826866" comment="lemon-3.7.17-8.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826867" comment="sqlite-3.7.17-8.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826868" comment="sqlite-devel-3.7.17-8.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826869" comment="sqlite-doc-3.7.17-8.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826870" comment="sqlite-tcl-3.7.17-8.el7_7.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826866" comment="lemon-3.7.17-8.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826867" comment="sqlite-3.7.17-8.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826868" comment="sqlite-devel-3.7.17-8.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826869" comment="sqlite-doc-3.7.17-8.el7_7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826870" comment="sqlite-tcl-3.7.17-8.el7_7.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:856" version="1" class="patch">
	<metadata>
		<title>security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-6851" ref_url="https://www.suse.com/security/cve/CVE-2020-6851/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0262.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0262.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6851/">CVE-2020-6851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6851">CVE-2020-6851 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826871" comment="openjpeg2-2.3.1-2.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826872" comment="openjpeg2-devel-2.3.1-2.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826873" comment="openjpeg2-devel-docs-2.3.1-2.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826874" comment="openjpeg2-tools-2.3.1-2.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:857" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0366.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0366.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826875" comment="qemu-img-1.5.3-167.el7_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826876" comment="qemu-kvm-1.5.3-167.el7_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826877" comment="qemu-kvm-common-1.5.3-167.el7_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826878" comment="qemu-kvm-tools-1.5.3-167.el7_7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:858" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14898" ref_url="https://www.suse.com/security/cve/CVE-2019-14898/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0374.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0374.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14816">CVE-2019-14816 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14898/">CVE-2019-14898 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14898">CVE-2019-14898 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14901">CVE-2019-14901 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826879" comment="bpftool-3.10.0-1062.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826880" comment="kernel-3.10.0-1062.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826881" comment="kernel-abi-whitelists-3.10.0-1062.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826882" comment="kernel-debug-3.10.0-1062.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826885" comment="kernel-doc-3.10.0-1062.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826886" comment="kernel-headers-3.10.0-1062.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826887" comment="kernel-tools-3.10.0-1062.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826888" comment="kernel-tools-libs-3.10.0-1062.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826890" comment="perf-3.10.0-1062.12.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826891" comment="python-perf-3.10.0-1062.12.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:859" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-10195" ref_url="https://www.suse.com/security/cve/CVE-2019-10195/" source="CVE"/>
		<reference ref_id="CVE-2019-14867" ref_url="https://www.suse.com/security/cve/CVE-2019-14867/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0378.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0378.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10195/">CVE-2019-10195 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10195">CVE-2019-10195 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14867/">CVE-2019-14867 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14867">CVE-2019-14867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826892" comment="ipa-client-4.6.5-11.el7_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826893" comment="ipa-client-common-4.6.5-11.el7_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826894" comment="ipa-common-4.6.5-11.el7_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826895" comment="ipa-python-compat-4.6.5-11.el7_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826896" comment="ipa-server-4.6.5-11.el7_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826897" comment="ipa-server-common-4.6.5-11.el7_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826898" comment="ipa-server-dns-4.6.5-11.el7_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826899" comment="ipa-server-trust-ad-4.6.5-11.el7_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826900" comment="python2-ipaclient-4.6.5-11.el7_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826901" comment="python2-ipalib-4.6.5-11.el7_7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826902" comment="python2-ipaserver-4.6.5-11.el7_7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:860" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0520.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0520.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6796">CVE-2020-6796 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826903" comment="firefox-68.5.0-2.el7_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:861" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0540.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0540.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18634">CVE-2019-18634 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826904" comment="sudo-1.8.23-4.el7_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826905" comment="sudo-devel-1.8.23-4.el7_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:862" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0541.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0541.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2583">CVE-2020-2583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2590">CVE-2020-2590 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2593">CVE-2020-2593 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2601">CVE-2020-2601 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2604">CVE-2020-2604 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2654">CVE-2020-2654 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2659">CVE-2020-2659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826906" comment="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826907" comment="java-1.7.0-openjdk-accessibility-1.7.0.251-2.6.21.0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826908" comment="java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826909" comment="java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826910" comment="java-1.7.0-openjdk-headless-1.7.0.251-2.6.21.0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826911" comment="java-1.7.0-openjdk-javadoc-1.7.0.251-2.6.21.0.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826912" comment="java-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:863" version="1" class="patch">
	<metadata>
		<title>security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0550.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0550.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8112">CVE-2020-8112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826913" comment="openjpeg2-2.3.1-3.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826914" comment="openjpeg2-devel-2.3.1-3.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826915" comment="openjpeg2-devel-docs-2.3.1-3.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826916" comment="openjpeg2-tools-2.3.1-3.el7_7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826913" comment="openjpeg2-2.3.1-3.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826914" comment="openjpeg2-devel-2.3.1-3.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826915" comment="openjpeg2-devel-docs-2.3.1-3.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826916" comment="openjpeg2-tools-2.3.1-3.el7_7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:864" version="1" class="patch">
	<metadata>
		<title>security update for ksh (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-14868" ref_url="https://www.suse.com/security/cve/CVE-2019-14868/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0568.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0568.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14868/">CVE-2019-14868 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14868">CVE-2019-14868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826917" comment="ksh-20120801-140.el7_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:865" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-6792" ref_url="https://www.suse.com/security/cve/CVE-2020-6792/" source="CVE"/>
		<reference ref_id="CVE-2020-6793" ref_url="https://www.suse.com/security/cve/CVE-2020-6793/" source="CVE"/>
		<reference ref_id="CVE-2020-6794" ref_url="https://www.suse.com/security/cve/CVE-2020-6794/" source="CVE"/>
		<reference ref_id="CVE-2020-6795" ref_url="https://www.suse.com/security/cve/CVE-2020-6795/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0576.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0576.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6792/">CVE-2020-6792 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6792">CVE-2020-6792 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6793/">CVE-2020-6793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6793">CVE-2020-6793 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6794/">CVE-2020-6794 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6794">CVE-2020-6794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6795/">CVE-2020-6795 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6795">CVE-2020-6795 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6798">CVE-2020-6798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6800">CVE-2020-6800 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826918" comment="thunderbird-68.5.0-1.el7_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:866" version="1" class="patch">
	<metadata>
		<title>security update for python-pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-16865" ref_url="https://www.suse.com/security/cve/CVE-2019-16865/" source="CVE"/>
		<reference ref_id="CVE-2020-5312" ref_url="https://www.suse.com/security/cve/CVE-2020-5312/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0578.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0578.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16865/">CVE-2019-16865 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16865">CVE-2019-16865 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5312/">CVE-2020-5312 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5312">CVE-2020-5312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826919" comment="python-pillow-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826920" comment="python-pillow-devel-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826921" comment="python-pillow-doc-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826922" comment="python-pillow-qt-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826923" comment="python-pillow-sane-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826924" comment="python-pillow-tk-2.0.0-20.gitd1c6db8.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:867" version="1" class="patch">
	<metadata>
		<title>security update for ppp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0630.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0630.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8597">CVE-2020-8597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826925" comment="ppp-2.4.5-34.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826926" comment="ppp-devel-2.4.5-34.el7_7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826925" comment="ppp-2.4.5-34.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826926" comment="ppp-devel-2.4.5-34.el7_7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:868" version="1" class="patch">
	<metadata>
		<title>security update for http-parser (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-15605" ref_url="https://www.suse.com/security/cve/CVE-2019-15605/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0703.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0703.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-15605/">CVE-2019-15605 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15605">CVE-2019-15605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826927" comment="http-parser-2.7.1-8.el7_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826928" comment="http-parser-devel-2.7.1-8.el7_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:869" version="1" class="patch">
	<metadata>
		<title>security update for xerces-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-1311" ref_url="https://www.suse.com/security/cve/CVE-2018-1311/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0704.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0704.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1311/">CVE-2018-1311 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1311">CVE-2018-1311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826929" comment="xerces-c-3.1.1-10.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826930" comment="xerces-c-devel-3.1.1-10.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826931" comment="xerces-c-doc-3.1.1-10.el7_7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826929" comment="xerces-c-3.1.1-10.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826930" comment="xerces-c-devel-3.1.1-10.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826931" comment="xerces-c-doc-3.1.1-10.el7_7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:870" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0815.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0815.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826932" comment="firefox-68.6.0-1.el7_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:871" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0834.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0834.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11487">CVE-2019-11487 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">CVE-2019-17666 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19338">CVE-2019-19338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826933" comment="bpftool-3.10.0-1062.18.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826934" comment="kernel-3.10.0-1062.18.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826935" comment="kernel-abi-whitelists-3.10.0-1062.18.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826936" comment="kernel-debug-3.10.0-1062.18.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826939" comment="kernel-doc-3.10.0-1062.18.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826940" comment="kernel-headers-3.10.0-1062.18.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826941" comment="kernel-tools-3.10.0-1062.18.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826942" comment="kernel-tools-libs-3.10.0-1062.18.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826944" comment="perf-3.10.0-1062.18.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826945" comment="python-perf-3.10.0-1062.18.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:872" version="1" class="patch">
	<metadata>
		<title>security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0850.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0850.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826946" comment="python3-pip-9.0.3-7.el7_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:873" version="1" class="patch">
	<metadata>
		<title>security update for python-virtualenv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0851.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0851.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826947" comment="python-virtualenv-15.1.0-4.el7_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:874" version="1" class="patch">
	<metadata>
		<title>security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0853.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0853.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20044">CVE-2019-20044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826948" comment="zsh-5.0.2-34.el7_7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826949" comment="zsh-html-5.0.2-34.el7_7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:875" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0855.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0855.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1938">CVE-2020-1938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826950" comment="tomcat-7.0.76-11.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826951" comment="tomcat-admin-webapps-7.0.76-11.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826952" comment="tomcat-docs-webapp-7.0.76-11.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826953" comment="tomcat-el-2.2-api-7.0.76-11.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826954" comment="tomcat-javadoc-7.0.76-11.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826955" comment="tomcat-jsp-2.2-api-7.0.76-11.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826956" comment="tomcat-jsvc-7.0.76-11.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826957" comment="tomcat-lib-7.0.76-11.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826958" comment="tomcat-servlet-3.0-api-7.0.76-11.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826959" comment="tomcat-webapps-7.0.76-11.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:876" version="1" class="patch">
	<metadata>
		<title>security update for icu (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0897.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0897.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826960" comment="icu-50.2-4.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826961" comment="libicu-50.2-4.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826962" comment="libicu-devel-50.2-4.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826963" comment="libicu-doc-50.2-4.el7_7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826960" comment="icu-50.2-4.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826961" comment="libicu-50.2-4.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826962" comment="libicu-devel-50.2-4.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826963" comment="libicu-doc-50.2-4.el7_7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:877" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0905.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0905.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20503">CVE-2019-20503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6805">CVE-2020-6805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6806">CVE-2020-6806 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6807">CVE-2020-6807 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6811">CVE-2020-6811 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6812">CVE-2020-6812 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6814">CVE-2020-6814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826964" comment="thunderbird-68.6.0-1.el7_7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:878" version="1" class="patch">
	<metadata>
		<title>security update for libvncserver (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0913.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0913.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15690">CVE-2019-15690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826965" comment="libvncserver-0.9.9-14.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826966" comment="libvncserver-devel-0.9.9-14.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:879" version="1" class="patch">
	<metadata>
		<title>security update for ipmitool (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:0984.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:0984.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5208">CVE-2020-5208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826967" comment="bmc-snmp-proxy-1.8.18-9.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826968" comment="exchange-bmc-os-info-1.8.18-9.el7_7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826969" comment="ipmitool-1.8.18-9.el7_7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:880" version="1" class="patch">
	<metadata>
		<title>security update for rsyslog (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-17041" ref_url="https://www.suse.com/security/cve/CVE-2019-17041/" source="CVE"/>
		<reference ref_id="CVE-2019-17042" ref_url="https://www.suse.com/security/cve/CVE-2019-17042/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1000.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1000.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17041/">CVE-2019-17041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17041">CVE-2019-17041 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17042/">CVE-2019-17042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17042">CVE-2019-17042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826970" comment="rsyslog-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826971" comment="rsyslog-crypto-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826972" comment="rsyslog-doc-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826973" comment="rsyslog-elasticsearch-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826974" comment="rsyslog-gnutls-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826975" comment="rsyslog-gssapi-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826976" comment="rsyslog-kafka-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826977" comment="rsyslog-libdbi-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826978" comment="rsyslog-mmaudit-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826979" comment="rsyslog-mmjsonparse-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826980" comment="rsyslog-mmkubernetes-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826981" comment="rsyslog-mmnormalize-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826982" comment="rsyslog-mmsnmptrapd-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826983" comment="rsyslog-mysql-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826984" comment="rsyslog-pgsql-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826985" comment="rsyslog-relp-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826986" comment="rsyslog-snmp-8.24.0-52.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826987" comment="rsyslog-udpspoof-8.24.0-52.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:881" version="1" class="patch">
	<metadata>
		<title>security update for mod_auth_mellon (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-13038" ref_url="https://www.suse.com/security/cve/CVE-2019-13038/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1003.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1003.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13038/">CVE-2019-13038 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13038">CVE-2019-13038 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826988" comment="mod_auth_mellon-0.14.0-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826989" comment="mod_auth_mellon-diagnostics-0.14.0-8.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:882" version="1" class="patch">
	<metadata>
		<title>security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1011.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1011.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2716">CVE-2015-2716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826990" comment="expat-2.1.0-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826991" comment="expat-devel-2.1.0-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826992" comment="expat-static-2.1.0-11.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:883" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-9289" ref_url="https://www.suse.com/security/cve/CVE-2015-9289/" source="CVE"/>
		<reference ref_id="CVE-2017-17807" ref_url="https://www.suse.com/security/cve/CVE-2017-17807/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638/" source="CVE"/>
		<reference ref_id="CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639/" source="CVE"/>
		<reference ref_id="CVE-2019-11190" ref_url="https://www.suse.com/security/cve/CVE-2019-11190/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382/" source="CVE"/>
		<reference ref_id="CVE-2019-13233" ref_url="https://www.suse.com/security/cve/CVE-2019-13233/" source="CVE"/>
		<reference ref_id="CVE-2019-13648" ref_url="https://www.suse.com/security/cve/CVE-2019-13648/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-15916" ref_url="https://www.suse.com/security/cve/CVE-2019-15916/" source="CVE"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-3901" ref_url="https://www.suse.com/security/cve/CVE-2019-3901/" source="CVE"/>
		<reference ref_id="CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1016.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1016.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9289/">CVE-2015-9289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9289">CVE-2015-9289 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17807/">CVE-2017-17807 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17807">CVE-2017-17807 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19985">CVE-2018-19985 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20169">CVE-2018-20169 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7191">CVE-2018-7191 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10207">CVE-2019-10207 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10638">CVE-2019-10638 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10639">CVE-2019-10639 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11190/">CVE-2019-11190 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11190">CVE-2019-11190 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11884">CVE-2019-11884 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12382">CVE-2019-12382 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13233/">CVE-2019-13233 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13233">CVE-2019-13233 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13648/">CVE-2019-13648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13648">CVE-2019-13648 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14283">CVE-2019-14283 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15916/">CVE-2019-15916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15916">CVE-2019-15916 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16746">CVE-2019-16746 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18660">CVE-2019-18660 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3901/">CVE-2019-3901 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3901">CVE-2019-3901 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9503">CVE-2019-9503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009826993" comment="bpftool-3.10.0-1127.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826994" comment="kernel-3.10.0-1127.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826995" comment="kernel-abi-whitelists-3.10.0-1127.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826996" comment="kernel-debug-3.10.0-1127.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009826999" comment="kernel-doc-3.10.0-1127.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827000" comment="kernel-headers-3.10.0-1127.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827001" comment="kernel-tools-3.10.0-1127.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827002" comment="kernel-tools-libs-3.10.0-1127.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827004" comment="perf-3.10.0-1127.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827005" comment="python-perf-3.10.0-1127.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:884" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1020.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1020.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5436">CVE-2019-5436 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827006" comment="curl-7.29.0-57.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827007" comment="libcurl-7.29.0-57.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827008" comment="libcurl-devel-7.29.0-57.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:885" version="1" class="patch">
	<metadata>
		<title>security update for LibRaw (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-3820" ref_url="https://www.suse.com/security/cve/CVE-2019-3820/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1021.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1021.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3820/">CVE-2019-3820 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3820">CVE-2019-3820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827009" comment="LibRaw-0.19.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827010" comment="LibRaw-devel-0.19.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827011" comment="LibRaw-static-0.19.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827012" comment="accountsservice-0.6.50-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827013" comment="accountsservice-devel-0.6.50-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827014" comment="accountsservice-libs-0.6.50-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827015" comment="colord-1.3.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827016" comment="colord-devel-1.3.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827017" comment="colord-devel-docs-1.3.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827018" comment="colord-extra-profiles-1.3.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827019" comment="colord-libs-1.3.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827020" comment="control-center-3.28.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827021" comment="control-center-filesystem-3.28.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827022" comment="gdm-3.28.2-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827023" comment="gdm-devel-3.28.2-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827024" comment="gdm-pam-extensions-devel-3.28.2-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827025" comment="gnome-classic-session-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827026" comment="gnome-online-accounts-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827027" comment="gnome-online-accounts-devel-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827028" comment="gnome-settings-daemon-3.28.1-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827029" comment="gnome-settings-daemon-devel-3.28.1-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827030" comment="gnome-shell-3.28.3-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827031" comment="gnome-shell-extension-alternate-tab-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827032" comment="gnome-shell-extension-apps-menu-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827033" comment="gnome-shell-extension-auto-move-windows-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827034" comment="gnome-shell-extension-common-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827035" comment="gnome-shell-extension-dash-to-dock-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827036" comment="gnome-shell-extension-disable-screenshield-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827037" comment="gnome-shell-extension-drive-menu-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827038" comment="gnome-shell-extension-extra-osk-keys-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827039" comment="gnome-shell-extension-horizontal-workspaces-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827040" comment="gnome-shell-extension-launch-new-instance-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827041" comment="gnome-shell-extension-native-window-placement-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827042" comment="gnome-shell-extension-no-hot-corner-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827043" comment="gnome-shell-extension-panel-favorites-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827044" comment="gnome-shell-extension-places-menu-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827045" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827046" comment="gnome-shell-extension-systemMonitor-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827047" comment="gnome-shell-extension-top-icons-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827048" comment="gnome-shell-extension-updates-dialog-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827049" comment="gnome-shell-extension-user-theme-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827050" comment="gnome-shell-extension-window-grouper-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827051" comment="gnome-shell-extension-window-list-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827052" comment="gnome-shell-extension-windowsNavigator-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827053" comment="gnome-shell-extension-workspace-indicator-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827054" comment="gnome-tweak-tool-3.28.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827055" comment="gsettings-desktop-schemas-3.28.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827056" comment="gsettings-desktop-schemas-devel-3.28.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827057" comment="gtk-update-icon-cache-3.22.30-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827058" comment="gtk3-3.22.30-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827059" comment="gtk3-devel-3.22.30-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827060" comment="gtk3-devel-docs-3.22.30-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827061" comment="gtk3-immodule-xim-3.22.30-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827062" comment="gtk3-immodules-3.22.30-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827063" comment="gtk3-tests-3.22.30-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827064" comment="libcanberra-0.30-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827065" comment="libcanberra-devel-0.30-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827066" comment="libcanberra-gtk2-0.30-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827067" comment="libcanberra-gtk3-0.30-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827068" comment="libgweather-3.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827069" comment="libgweather-devel-3.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827070" comment="mutter-3.28.3-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827071" comment="mutter-devel-3.28.3-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827072" comment="nautilus-3.26.3.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827073" comment="nautilus-devel-3.26.3.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827074" comment="nautilus-extensions-3.26.3.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827075" comment="osinfo-db-20190805-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827076" comment="shared-mime-info-1.8-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827077" comment="tracker-1.10.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827078" comment="tracker-devel-1.10.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827079" comment="tracker-docs-1.10.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827080" comment="tracker-needle-1.10.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827081" comment="tracker-preferences-1.10.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827082" comment="xchat-2.8.8-25.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827083" comment="xchat-tcl-2.8.8-25.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827009" comment="LibRaw-0.19.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827010" comment="LibRaw-devel-0.19.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827011" comment="LibRaw-static-0.19.4-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827012" comment="accountsservice-0.6.50-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827013" comment="accountsservice-devel-0.6.50-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827014" comment="accountsservice-libs-0.6.50-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827015" comment="colord-1.3.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827016" comment="colord-devel-1.3.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827017" comment="colord-devel-docs-1.3.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827018" comment="colord-extra-profiles-1.3.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827019" comment="colord-libs-1.3.4-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827020" comment="control-center-3.28.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827021" comment="control-center-filesystem-3.28.1-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827022" comment="gdm-3.28.2-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827023" comment="gdm-devel-3.28.2-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827024" comment="gdm-pam-extensions-devel-3.28.2-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827025" comment="gnome-classic-session-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827026" comment="gnome-online-accounts-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827027" comment="gnome-online-accounts-devel-3.28.2-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827028" comment="gnome-settings-daemon-3.28.1-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827029" comment="gnome-settings-daemon-devel-3.28.1-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827030" comment="gnome-shell-3.28.3-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827031" comment="gnome-shell-extension-alternate-tab-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827032" comment="gnome-shell-extension-apps-menu-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827033" comment="gnome-shell-extension-auto-move-windows-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827034" comment="gnome-shell-extension-common-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827035" comment="gnome-shell-extension-dash-to-dock-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827036" comment="gnome-shell-extension-disable-screenshield-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827037" comment="gnome-shell-extension-drive-menu-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827038" comment="gnome-shell-extension-extra-osk-keys-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827039" comment="gnome-shell-extension-horizontal-workspaces-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827040" comment="gnome-shell-extension-launch-new-instance-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827041" comment="gnome-shell-extension-native-window-placement-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827042" comment="gnome-shell-extension-no-hot-corner-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827043" comment="gnome-shell-extension-panel-favorites-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827044" comment="gnome-shell-extension-places-menu-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827045" comment="gnome-shell-extension-screenshot-window-sizer-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827046" comment="gnome-shell-extension-systemMonitor-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827047" comment="gnome-shell-extension-top-icons-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827048" comment="gnome-shell-extension-updates-dialog-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827049" comment="gnome-shell-extension-user-theme-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827050" comment="gnome-shell-extension-window-grouper-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827051" comment="gnome-shell-extension-window-list-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827052" comment="gnome-shell-extension-windowsNavigator-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827053" comment="gnome-shell-extension-workspace-indicator-3.28.1-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827054" comment="gnome-tweak-tool-3.28.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827055" comment="gsettings-desktop-schemas-3.28.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827056" comment="gsettings-desktop-schemas-devel-3.28.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827057" comment="gtk-update-icon-cache-3.22.30-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827058" comment="gtk3-3.22.30-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827059" comment="gtk3-devel-3.22.30-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827060" comment="gtk3-devel-docs-3.22.30-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827061" comment="gtk3-immodule-xim-3.22.30-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827062" comment="gtk3-immodules-3.22.30-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827063" comment="gtk3-tests-3.22.30-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827064" comment="libcanberra-0.30-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827065" comment="libcanberra-devel-0.30-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827066" comment="libcanberra-gtk2-0.30-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827067" comment="libcanberra-gtk3-0.30-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827068" comment="libgweather-3.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827069" comment="libgweather-devel-3.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827070" comment="mutter-3.28.3-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827071" comment="mutter-devel-3.28.3-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827072" comment="nautilus-3.26.3.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827073" comment="nautilus-devel-3.26.3.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827074" comment="nautilus-extensions-3.26.3.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827075" comment="osinfo-db-20190805-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827076" comment="shared-mime-info-1.8-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827077" comment="tracker-1.10.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827078" comment="tracker-devel-1.10.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827079" comment="tracker-docs-1.10.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827080" comment="tracker-needle-1.10.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827081" comment="tracker-preferences-1.10.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827082" comment="xchat-2.8.8-25.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827083" comment="xchat-tcl-2.8.8-25.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:886" version="1" class="patch">
	<metadata>
		<title>security update for file (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1022.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1022.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10360">CVE-2018-10360 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827084" comment="file-5.11-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827085" comment="file-devel-5.11-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827086" comment="file-libs-5.11-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827087" comment="file-static-5.11-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827088" comment="python-magic-5.11-36.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:887" version="1" class="patch">
	<metadata>
		<title>security update for doxygen (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-10245" ref_url="https://www.suse.com/security/cve/CVE-2016-10245/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1034.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1034.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10245/">CVE-2016-10245 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10245">CVE-2016-10245 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827089" comment="doxygen-1.8.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827090" comment="doxygen-doxywizard-1.8.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827091" comment="doxygen-latex-1.8.5-4.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827089" comment="doxygen-1.8.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827090" comment="doxygen-doxywizard-1.8.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827091" comment="doxygen-latex-1.8.5-4.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:888" version="1" class="patch">
	<metadata>
		<title>security update for texlive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-17407" ref_url="https://www.suse.com/security/cve/CVE-2018-17407/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1036.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1036.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17407/">CVE-2018-17407 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17407">CVE-2018-17407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827092" comment="texlive-2012-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827093" comment="texlive-adjustbox-svn26555.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827094" comment="texlive-adjustbox-doc-svn26555.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827095" comment="texlive-ae-svn15878.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827096" comment="texlive-ae-doc-svn15878.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827097" comment="texlive-algorithms-svn15878.0.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827098" comment="texlive-algorithms-doc-svn15878.0.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827099" comment="texlive-amscls-svn29207.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827100" comment="texlive-amscls-doc-svn29207.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827101" comment="texlive-amsfonts-svn29208.3.04-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827102" comment="texlive-amsfonts-doc-svn29208.3.04-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827103" comment="texlive-amsmath-svn29327.2.14-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827104" comment="texlive-amsmath-doc-svn29327.2.14-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827105" comment="texlive-anysize-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827106" comment="texlive-anysize-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827107" comment="texlive-appendix-svn15878.1.2b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827108" comment="texlive-appendix-doc-svn15878.1.2b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827109" comment="texlive-arabxetex-svn17470.v1.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827110" comment="texlive-arabxetex-doc-svn17470.v1.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827111" comment="texlive-arphic-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827112" comment="texlive-arphic-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827113" comment="texlive-attachfile-svn21866.v1.5b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827114" comment="texlive-attachfile-doc-svn21866.v1.5b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827115" comment="texlive-avantgar-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827116" comment="texlive-babel-svn24756.3.8m-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827117" comment="texlive-babel-doc-svn24756.3.8m-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827118" comment="texlive-babelbib-svn25245.1.31-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827119" comment="texlive-babelbib-doc-svn25245.1.31-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827120" comment="texlive-base-2012-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827121" comment="texlive-beamer-svn29349.3.26-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827122" comment="texlive-beamer-doc-svn29349.3.26-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827123" comment="texlive-bera-svn20031.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827124" comment="texlive-bera-doc-svn20031.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827125" comment="texlive-beton-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827126" comment="texlive-beton-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827127" comment="texlive-bibtex-svn26689.0.99d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827128" comment="texlive-bibtex-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827129" comment="texlive-bibtex-doc-svn26689.0.99d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827130" comment="texlive-bibtopic-svn15878.1.1a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827131" comment="texlive-bibtopic-doc-svn15878.1.1a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827132" comment="texlive-bidi-svn29650.12.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827133" comment="texlive-bidi-doc-svn29650.12.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827134" comment="texlive-bigfoot-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827135" comment="texlive-bigfoot-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827136" comment="texlive-bookman-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827137" comment="texlive-booktabs-svn15878.1.61803-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827138" comment="texlive-booktabs-doc-svn15878.1.61803-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827139" comment="texlive-breakurl-svn15878.1.30-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827140" comment="texlive-breakurl-doc-svn15878.1.30-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827141" comment="texlive-caption-svn29026.3.3__2013_02_03_-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827142" comment="texlive-caption-doc-svn29026.3.3__2013_02_03_-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827143" comment="texlive-carlisle-svn18258.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827144" comment="texlive-carlisle-doc-svn18258.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827145" comment="texlive-changebar-svn29349.3.5c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827146" comment="texlive-changebar-doc-svn29349.3.5c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827147" comment="texlive-changepage-svn15878.1.0c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827148" comment="texlive-changepage-doc-svn15878.1.0c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827149" comment="texlive-charter-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827150" comment="texlive-charter-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827151" comment="texlive-chngcntr-svn17157.1.0a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827152" comment="texlive-chngcntr-doc-svn17157.1.0a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827153" comment="texlive-cite-svn19955.5.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827154" comment="texlive-cite-doc-svn19955.5.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827155" comment="texlive-cjk-svn26296.4.8.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827156" comment="texlive-cjk-doc-svn26296.4.8.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827157" comment="texlive-cm-svn29581.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827158" comment="texlive-cm-doc-svn29581.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827159" comment="texlive-cm-lgc-svn28250.0.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827160" comment="texlive-cm-lgc-doc-svn28250.0.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827161" comment="texlive-cm-super-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827162" comment="texlive-cm-super-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827163" comment="texlive-cmap-svn26568.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827164" comment="texlive-cmap-doc-svn26568.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827165" comment="texlive-cmextra-svn14075.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827166" comment="texlive-cns-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827167" comment="texlive-cns-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827168" comment="texlive-collectbox-svn26557.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827169" comment="texlive-collectbox-doc-svn26557.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827170" comment="texlive-collection-basic-svn26314.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827171" comment="texlive-collection-documentation-base-svn17091.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827172" comment="texlive-collection-fontsrecommended-svn28082.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827173" comment="texlive-collection-htmlxml-svn28251.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827174" comment="texlive-collection-latex-svn25030.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827175" comment="texlive-collection-latexrecommended-svn25795.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827176" comment="texlive-collection-xetex-svn29634.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827177" comment="texlive-colortbl-svn25394.v1.0a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827178" comment="texlive-colortbl-doc-svn25394.v1.0a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827179" comment="texlive-courier-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827180" comment="texlive-crop-svn15878.1.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827181" comment="texlive-crop-doc-svn15878.1.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827182" comment="texlive-csquotes-svn24393.5.1d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827183" comment="texlive-csquotes-doc-svn24393.5.1d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827184" comment="texlive-ctable-svn26694.1.23-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827185" comment="texlive-ctable-doc-svn26694.1.23-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827186" comment="texlive-currfile-svn29012.0.7b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827187" comment="texlive-currfile-doc-svn29012.0.7b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827188" comment="texlive-datetime-svn19834.2.58-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827189" comment="texlive-datetime-doc-svn19834.2.58-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827190" comment="texlive-dvipdfm-svn26689.0.13.2d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827191" comment="texlive-dvipdfm-bin-svn13663.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827192" comment="texlive-dvipdfm-doc-svn26689.0.13.2d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827193" comment="texlive-dvipdfmx-svn26765.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827194" comment="texlive-dvipdfmx-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827195" comment="texlive-dvipdfmx-def-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827196" comment="texlive-dvipdfmx-doc-svn26765.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827197" comment="texlive-dvipng-svn26689.1.14-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827198" comment="texlive-dvipng-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827199" comment="texlive-dvipng-doc-svn26689.1.14-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827200" comment="texlive-dvips-svn29585.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827201" comment="texlive-dvips-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827202" comment="texlive-dvips-doc-svn29585.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827203" comment="texlive-ec-svn25033.1.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827204" comment="texlive-ec-doc-svn25033.1.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827205" comment="texlive-eepic-svn15878.1.1e-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827206" comment="texlive-eepic-doc-svn15878.1.1e-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827207" comment="texlive-enctex-svn28602.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827208" comment="texlive-enctex-doc-svn28602.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827209" comment="texlive-enumitem-svn24146.3.5.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827210" comment="texlive-enumitem-doc-svn24146.3.5.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827211" comment="texlive-epsf-svn21461.2.7.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827212" comment="texlive-epsf-doc-svn21461.2.7.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827213" comment="texlive-epstopdf-svn26577.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827214" comment="texlive-epstopdf-bin-svn18336.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827215" comment="texlive-epstopdf-doc-svn26577.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827216" comment="texlive-eso-pic-svn21515.2.0c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827217" comment="texlive-eso-pic-doc-svn21515.2.0c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827218" comment="texlive-etex-svn22198.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827219" comment="texlive-etex-doc-svn22198.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827220" comment="texlive-etex-pkg-svn15878.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827221" comment="texlive-etex-pkg-doc-svn15878.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827222" comment="texlive-etoolbox-svn20922.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827223" comment="texlive-etoolbox-doc-svn20922.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827224" comment="texlive-euenc-svn19795.0.1h-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827225" comment="texlive-euenc-doc-svn19795.0.1h-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827226" comment="texlive-euler-svn17261.2.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827227" comment="texlive-euler-doc-svn17261.2.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827228" comment="texlive-euro-svn22191.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827229" comment="texlive-euro-doc-svn22191.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827230" comment="texlive-eurosym-svn17265.1.4_subrfix-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827231" comment="texlive-eurosym-doc-svn17265.1.4_subrfix-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827232" comment="texlive-extsizes-svn17263.1.4a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827233" comment="texlive-extsizes-doc-svn17263.1.4a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827234" comment="texlive-fancybox-svn18304.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827235" comment="texlive-fancybox-doc-svn18304.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827236" comment="texlive-fancyhdr-svn15878.3.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827237" comment="texlive-fancyhdr-doc-svn15878.3.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827238" comment="texlive-fancyref-svn15878.0.9c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827239" comment="texlive-fancyref-doc-svn15878.0.9c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827240" comment="texlive-fancyvrb-svn18492.2.8-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827241" comment="texlive-fancyvrb-doc-svn18492.2.8-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827242" comment="texlive-filecontents-svn24250.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827243" comment="texlive-filecontents-doc-svn24250.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827244" comment="texlive-filehook-svn24280.0.5d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827245" comment="texlive-filehook-doc-svn24280.0.5d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827246" comment="texlive-fix2col-svn17133.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827247" comment="texlive-fix2col-doc-svn17133.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827248" comment="texlive-fixlatvian-svn21631.1a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827249" comment="texlive-fixlatvian-doc-svn21631.1a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827250" comment="texlive-float-svn15878.1.3d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827251" comment="texlive-float-doc-svn15878.1.3d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827252" comment="texlive-fmtcount-svn28068.2.02-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827253" comment="texlive-fmtcount-doc-svn28068.2.02-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827254" comment="texlive-fncychap-svn20710.v1.34-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827255" comment="texlive-fncychap-doc-svn20710.v1.34-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827256" comment="texlive-fontbook-svn23608.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827257" comment="texlive-fontbook-doc-svn23608.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827258" comment="texlive-fontspec-svn29412.v2.3a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827259" comment="texlive-fontspec-doc-svn29412.v2.3a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827260" comment="texlive-fontware-svn26689.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827261" comment="texlive-fontware-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827262" comment="texlive-fontwrap-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827263" comment="texlive-fontwrap-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827264" comment="texlive-footmisc-svn23330.5.5b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827265" comment="texlive-footmisc-doc-svn23330.5.5b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827266" comment="texlive-fp-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827267" comment="texlive-fp-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827268" comment="texlive-fpl-svn15878.1.002-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827269" comment="texlive-fpl-doc-svn15878.1.002-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827270" comment="texlive-framed-svn26789.0.96-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827271" comment="texlive-framed-doc-svn26789.0.96-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827272" comment="texlive-garuda-c90-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827273" comment="texlive-geometry-svn19716.5.6-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827274" comment="texlive-geometry-doc-svn19716.5.6-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827275" comment="texlive-glyphlist-svn28576.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827276" comment="texlive-graphics-svn25405.1.0o-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827277" comment="texlive-graphics-doc-svn25405.1.0o-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827278" comment="texlive-gsftopk-svn26689.1.19.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827279" comment="texlive-gsftopk-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827280" comment="texlive-helvetic-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827281" comment="texlive-hyperref-svn28213.6.83m-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827282" comment="texlive-hyperref-doc-svn28213.6.83m-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827283" comment="texlive-hyph-utf8-svn29641.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827284" comment="texlive-hyph-utf8-doc-svn29641.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827285" comment="texlive-hyphen-base-svn29197.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827286" comment="texlive-hyphenat-svn15878.2.3c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827287" comment="texlive-hyphenat-doc-svn15878.2.3c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827288" comment="texlive-ifetex-svn24853.1.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827289" comment="texlive-ifetex-doc-svn24853.1.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827290" comment="texlive-ifluatex-svn26725.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827291" comment="texlive-ifluatex-doc-svn26725.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827292" comment="texlive-ifmtarg-svn19363.1.2a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827293" comment="texlive-ifmtarg-doc-svn19363.1.2a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827294" comment="texlive-ifoddpage-svn23979.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827295" comment="texlive-ifoddpage-doc-svn23979.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827296" comment="texlive-iftex-svn29654.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827297" comment="texlive-iftex-doc-svn29654.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827298" comment="texlive-ifxetex-svn19685.0.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827299" comment="texlive-ifxetex-doc-svn19685.0.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827300" comment="texlive-index-svn24099.4.1beta-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827301" comment="texlive-index-doc-svn24099.4.1beta-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827302" comment="texlive-jadetex-svn23409.3.13-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827303" comment="texlive-jadetex-bin-svn3006.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827304" comment="texlive-jadetex-doc-svn23409.3.13-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827305" comment="texlive-jknapltx-svn19440.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827306" comment="texlive-jknapltx-doc-svn19440.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827307" comment="texlive-kastrup-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827308" comment="texlive-kastrup-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827309" comment="texlive-kerkis-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827310" comment="texlive-kerkis-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827311" comment="texlive-koma-script-svn27255.3.11b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827312" comment="texlive-kpathsea-svn28792.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827313" comment="texlive-kpathsea-bin-svn27347.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827314" comment="texlive-kpathsea-doc-svn28792.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827315" comment="texlive-kpathsea-lib-2012-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827316" comment="texlive-kpathsea-lib-devel-2012-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827317" comment="texlive-l3experimental-svn29361.SVN_4467-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827318" comment="texlive-l3experimental-doc-svn29361.SVN_4467-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827319" comment="texlive-l3kernel-svn29409.SVN_4469-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827320" comment="texlive-l3kernel-doc-svn29409.SVN_4469-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827321" comment="texlive-l3packages-svn29361.SVN_4467-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827322" comment="texlive-l3packages-doc-svn29361.SVN_4467-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827323" comment="texlive-lastpage-svn28985.1.2l-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827324" comment="texlive-lastpage-doc-svn28985.1.2l-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827325" comment="texlive-latex-svn27907.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827326" comment="texlive-latex-bin-svn26689.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827327" comment="texlive-latex-bin-bin-svn14050.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827328" comment="texlive-latex-doc-svn27907.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827329" comment="texlive-latex-fonts-svn28888.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827330" comment="texlive-latex-fonts-doc-svn28888.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827331" comment="texlive-latexconfig-svn28991.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827332" comment="texlive-lettrine-svn29391.1.64-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827333" comment="texlive-lettrine-doc-svn29391.1.64-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827334" comment="texlive-listings-svn15878.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827335" comment="texlive-listings-doc-svn15878.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827336" comment="texlive-lm-svn28119.2.004-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827337" comment="texlive-lm-doc-svn28119.2.004-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827338" comment="texlive-lm-math-svn29044.1.958-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827339" comment="texlive-lm-math-doc-svn29044.1.958-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827340" comment="texlive-ltxmisc-svn21927.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827341" comment="texlive-lua-alt-getopt-svn29349.0.7.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827342" comment="texlive-lua-alt-getopt-doc-svn29349.0.7.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827343" comment="texlive-lualatex-math-svn29346.1.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827344" comment="texlive-lualatex-math-doc-svn29346.1.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827345" comment="texlive-luaotfload-svn26718.1.26-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827346" comment="texlive-luaotfload-bin-svn18579.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827347" comment="texlive-luaotfload-doc-svn26718.1.26-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827348" comment="texlive-luatex-svn26689.0.70.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827349" comment="texlive-luatex-bin-svn26912.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827350" comment="texlive-luatex-doc-svn26689.0.70.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827351" comment="texlive-luatexbase-svn22560.0.31-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827352" comment="texlive-luatexbase-doc-svn22560.0.31-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827353" comment="texlive-makecmds-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827354" comment="texlive-makecmds-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827355" comment="texlive-makeindex-svn26689.2.12-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827356" comment="texlive-makeindex-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827357" comment="texlive-makeindex-doc-svn26689.2.12-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827358" comment="texlive-marginnote-svn25880.v1.1i-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827359" comment="texlive-marginnote-doc-svn25880.v1.1i-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827360" comment="texlive-marvosym-svn29349.2.2a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827361" comment="texlive-marvosym-doc-svn29349.2.2a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827362" comment="texlive-mathpazo-svn15878.1.003-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827363" comment="texlive-mathpazo-doc-svn15878.1.003-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827364" comment="texlive-mathspec-svn15878.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827365" comment="texlive-mathspec-doc-svn15878.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827366" comment="texlive-mdwtools-svn15878.1.05.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827367" comment="texlive-mdwtools-doc-svn15878.1.05.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827368" comment="texlive-memoir-svn21638.3.6j_patch_6.0g-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827369" comment="texlive-memoir-doc-svn21638.3.6j_patch_6.0g-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827370" comment="texlive-metafont-svn26689.2.718281-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827371" comment="texlive-metafont-bin-svn26912.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827372" comment="texlive-metalogo-svn18611.0.12-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827373" comment="texlive-metalogo-doc-svn18611.0.12-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827374" comment="texlive-metapost-svn26689.1.212-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827375" comment="texlive-metapost-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827376" comment="texlive-metapost-doc-svn26689.1.212-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827377" comment="texlive-metapost-examples-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827378" comment="texlive-mflogo-svn17487.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827379" comment="texlive-mflogo-doc-svn17487.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827380" comment="texlive-mfnfss-svn19410.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827381" comment="texlive-mfnfss-doc-svn19410.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827382" comment="texlive-mfware-svn26689.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827383" comment="texlive-mfware-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827384" comment="texlive-mh-svn29420.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827385" comment="texlive-mh-doc-svn29420.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827386" comment="texlive-microtype-svn29392.2.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827387" comment="texlive-microtype-doc-svn29392.2.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827388" comment="texlive-misc-svn24955.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827389" comment="texlive-mnsymbol-svn18651.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827390" comment="texlive-mnsymbol-doc-svn18651.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827391" comment="texlive-mparhack-svn15878.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827392" comment="texlive-mparhack-doc-svn15878.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827393" comment="texlive-mptopdf-svn26689.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827394" comment="texlive-mptopdf-bin-svn18674.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827395" comment="texlive-ms-svn24467.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827396" comment="texlive-ms-doc-svn24467.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827397" comment="texlive-multido-svn18302.1.42-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827398" comment="texlive-multido-doc-svn18302.1.42-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827399" comment="texlive-multirow-svn17256.1.6-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827400" comment="texlive-multirow-doc-svn17256.1.6-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827401" comment="texlive-natbib-svn20668.8.31b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827402" comment="texlive-natbib-doc-svn20668.8.31b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827403" comment="texlive-ncctools-svn15878.3.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827404" comment="texlive-ncctools-doc-svn15878.3.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827405" comment="texlive-ncntrsbk-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827406" comment="texlive-norasi-c90-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827407" comment="texlive-ntgclass-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827408" comment="texlive-ntgclass-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827409" comment="texlive-oberdiek-svn26725.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827410" comment="texlive-oberdiek-doc-svn26725.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827411" comment="texlive-overpic-svn19712.0.53-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827412" comment="texlive-overpic-doc-svn19712.0.53-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827413" comment="texlive-palatino-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827414" comment="texlive-paralist-svn15878.2.3b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827415" comment="texlive-paralist-doc-svn15878.2.3b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827416" comment="texlive-parallel-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827417" comment="texlive-parallel-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827418" comment="texlive-parskip-svn19963.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827419" comment="texlive-parskip-doc-svn19963.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827420" comment="texlive-passivetex-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827421" comment="texlive-pdfpages-svn27574.0.4t-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827422" comment="texlive-pdfpages-doc-svn27574.0.4t-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827423" comment="texlive-pdftex-svn29585.1.40.11-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827424" comment="texlive-pdftex-bin-svn27321.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827425" comment="texlive-pdftex-def-svn22653.0.06d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827426" comment="texlive-pdftex-doc-svn29585.1.40.11-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827427" comment="texlive-pgf-svn22614.2.10-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827428" comment="texlive-pgf-doc-svn22614.2.10-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827429" comment="texlive-philokalia-svn18651.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827430" comment="texlive-philokalia-doc-svn18651.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827431" comment="texlive-placeins-svn19848.2.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827432" comment="texlive-placeins-doc-svn19848.2.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827433" comment="texlive-plain-svn26647.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827434" comment="texlive-polyglossia-svn26163.v1.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827435" comment="texlive-polyglossia-doc-svn26163.v1.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827436" comment="texlive-powerdot-svn25656.1.4i-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827437" comment="texlive-powerdot-doc-svn25656.1.4i-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827438" comment="texlive-preprint-svn16085.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827439" comment="texlive-preprint-doc-svn16085.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827440" comment="texlive-psfrag-svn15878.3.04-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827441" comment="texlive-psfrag-doc-svn15878.3.04-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827442" comment="texlive-pslatex-svn16416.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827443" comment="texlive-psnfss-svn23394.9.2a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827444" comment="texlive-psnfss-doc-svn23394.9.2a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827445" comment="texlive-pspicture-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827446" comment="texlive-pspicture-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827447" comment="texlive-pst-3d-svn17257.1.10-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827448" comment="texlive-pst-3d-doc-svn17257.1.10-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827449" comment="texlive-pst-blur-svn15878.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827450" comment="texlive-pst-blur-doc-svn15878.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827451" comment="texlive-pst-coil-svn24020.1.06-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827452" comment="texlive-pst-coil-doc-svn24020.1.06-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827453" comment="texlive-pst-eps-svn15878.1.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827454" comment="texlive-pst-eps-doc-svn15878.1.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827455" comment="texlive-pst-fill-svn15878.1.01-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827456" comment="texlive-pst-fill-doc-svn15878.1.01-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827457" comment="texlive-pst-grad-svn15878.1.06-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827458" comment="texlive-pst-grad-doc-svn15878.1.06-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827459" comment="texlive-pst-math-svn20176.0.61-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827460" comment="texlive-pst-math-doc-svn20176.0.61-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827461" comment="texlive-pst-node-svn27799.1.25-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827462" comment="texlive-pst-node-doc-svn27799.1.25-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827463" comment="texlive-pst-plot-svn28729.1.44-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827464" comment="texlive-pst-plot-doc-svn28729.1.44-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827465" comment="texlive-pst-slpe-svn24391.1.31-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827466" comment="texlive-pst-slpe-doc-svn24391.1.31-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827467" comment="texlive-pst-text-svn15878.1.00-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827468" comment="texlive-pst-text-doc-svn15878.1.00-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827469" comment="texlive-pst-tree-svn24142.1.12-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827470" comment="texlive-pst-tree-doc-svn24142.1.12-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827471" comment="texlive-pstricks-svn29678.2.39-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827472" comment="texlive-pstricks-add-svn28750.3.59-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827473" comment="texlive-pstricks-add-doc-svn28750.3.59-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827474" comment="texlive-pstricks-doc-svn29678.2.39-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827475" comment="texlive-ptext-svn28124.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827476" comment="texlive-ptext-doc-svn28124.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827477" comment="texlive-pxfonts-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827478" comment="texlive-pxfonts-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827479" comment="texlive-qstest-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827480" comment="texlive-qstest-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827481" comment="texlive-rcs-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827482" comment="texlive-rcs-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827483" comment="texlive-realscripts-svn29423.0.3b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827484" comment="texlive-realscripts-doc-svn29423.0.3b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827485" comment="texlive-rotating-svn16832.2.16b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827486" comment="texlive-rotating-doc-svn16832.2.16b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827487" comment="texlive-rsfs-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827488" comment="texlive-rsfs-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827489" comment="texlive-sansmath-svn17997.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827490" comment="texlive-sansmath-doc-svn17997.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827491" comment="texlive-sauerj-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827492" comment="texlive-sauerj-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827493" comment="texlive-scheme-basic-svn25923.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827494" comment="texlive-section-svn20180.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827495" comment="texlive-section-doc-svn20180.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827496" comment="texlive-sectsty-svn15878.2.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827497" comment="texlive-sectsty-doc-svn15878.2.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827498" comment="texlive-seminar-svn18322.1.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827499" comment="texlive-seminar-doc-svn18322.1.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827500" comment="texlive-sepnum-svn20186.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827501" comment="texlive-sepnum-doc-svn20186.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827502" comment="texlive-setspace-svn24881.6.7a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827503" comment="texlive-setspace-doc-svn24881.6.7a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827504" comment="texlive-showexpl-svn27790.v0.3j-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827505" comment="texlive-showexpl-doc-svn27790.v0.3j-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827506" comment="texlive-soul-svn15878.2.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827507" comment="texlive-soul-doc-svn15878.2.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827508" comment="texlive-stmaryrd-svn22027.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827509" comment="texlive-stmaryrd-doc-svn22027.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827510" comment="texlive-subfig-svn15878.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827511" comment="texlive-subfig-doc-svn15878.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827512" comment="texlive-subfigure-svn15878.2.1.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827513" comment="texlive-subfigure-doc-svn15878.2.1.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827514" comment="texlive-svn-prov-svn18017.3.1862-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827515" comment="texlive-svn-prov-doc-svn18017.3.1862-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827516" comment="texlive-symbol-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827517" comment="texlive-t2-svn29349.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827518" comment="texlive-t2-doc-svn29349.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827519" comment="texlive-tetex-svn29585.3.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827520" comment="texlive-tetex-bin-svn27344.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827521" comment="texlive-tetex-doc-svn29585.3.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827522" comment="texlive-tex-svn26689.3.1415926-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827523" comment="texlive-tex-bin-svn26912.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827524" comment="texlive-tex-gyre-svn18651.2.004-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827525" comment="texlive-tex-gyre-doc-svn18651.2.004-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827526" comment="texlive-tex-gyre-math-svn29045.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827527" comment="texlive-tex-gyre-math-doc-svn29045.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827528" comment="texlive-tex4ht-svn29474.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827529" comment="texlive-tex4ht-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827530" comment="texlive-tex4ht-doc-svn29474.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827531" comment="texlive-texconfig-svn29349.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827532" comment="texlive-texconfig-bin-svn27344.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827533" comment="texlive-texlive.infra-svn28217.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827534" comment="texlive-texlive.infra-bin-svn22566.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827535" comment="texlive-texlive.infra-doc-svn28217.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827536" comment="texlive-textcase-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827537" comment="texlive-textcase-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827538" comment="texlive-textpos-svn28261.1.7h-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827539" comment="texlive-textpos-doc-svn28261.1.7h-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827540" comment="texlive-thailatex-svn29349.0.5.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827541" comment="texlive-thailatex-doc-svn29349.0.5.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827542" comment="texlive-threeparttable-svn17383.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827543" comment="texlive-threeparttable-doc-svn17383.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827544" comment="texlive-thumbpdf-svn26689.3.15-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827545" comment="texlive-thumbpdf-bin-svn6898.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827546" comment="texlive-thumbpdf-doc-svn26689.3.15-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827547" comment="texlive-times-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827548" comment="texlive-tipa-svn29349.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827549" comment="texlive-tipa-doc-svn29349.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827550" comment="texlive-titlesec-svn24852.2.10.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827551" comment="texlive-titlesec-doc-svn24852.2.10.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827552" comment="texlive-titling-svn15878.2.1d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827553" comment="texlive-titling-doc-svn15878.2.1d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827554" comment="texlive-tocloft-svn20084.2.3e-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827555" comment="texlive-tocloft-doc-svn20084.2.3e-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827556" comment="texlive-tools-svn26263.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827557" comment="texlive-tools-doc-svn26263.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827558" comment="texlive-txfonts-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827559" comment="texlive-txfonts-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827560" comment="texlive-type1cm-svn21820.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827561" comment="texlive-type1cm-doc-svn21820.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827562" comment="texlive-typehtml-svn17134.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827563" comment="texlive-typehtml-doc-svn17134.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827564" comment="texlive-ucharclasses-svn27820.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827565" comment="texlive-ucharclasses-doc-svn27820.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827566" comment="texlive-ucs-svn27549.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827567" comment="texlive-ucs-doc-svn27549.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827568" comment="texlive-uhc-svn16791.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827569" comment="texlive-uhc-doc-svn16791.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827570" comment="texlive-ulem-svn26785.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827571" comment="texlive-ulem-doc-svn26785.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827572" comment="texlive-underscore-svn18261.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827573" comment="texlive-underscore-doc-svn18261.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827574" comment="texlive-unicode-math-svn29413.0.7d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827575" comment="texlive-unicode-math-doc-svn29413.0.7d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827576" comment="texlive-unisugar-svn22357.0.92-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827577" comment="texlive-unisugar-doc-svn22357.0.92-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827578" comment="texlive-url-svn16864.3.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827579" comment="texlive-url-doc-svn16864.3.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827580" comment="texlive-utopia-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827581" comment="texlive-utopia-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827582" comment="texlive-varwidth-svn24104.0.92-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827583" comment="texlive-varwidth-doc-svn24104.0.92-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827584" comment="texlive-wadalab-svn22576.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827585" comment="texlive-wadalab-doc-svn22576.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827586" comment="texlive-was-svn21439.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827587" comment="texlive-was-doc-svn21439.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827588" comment="texlive-wasy-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827589" comment="texlive-wasy-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827590" comment="texlive-wasysym-svn15878.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827591" comment="texlive-wasysym-doc-svn15878.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827592" comment="texlive-wrapfig-svn22048.3.6-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827593" comment="texlive-wrapfig-doc-svn22048.3.6-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827594" comment="texlive-xcolor-svn15878.2.11-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827595" comment="texlive-xcolor-doc-svn15878.2.11-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827596" comment="texlive-xdvi-svn26689.22.85-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827597" comment="texlive-xdvi-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827598" comment="texlive-xecjk-svn28816.3.1.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827599" comment="texlive-xecjk-doc-svn28816.3.1.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827600" comment="texlive-xecolor-svn29660.0.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827601" comment="texlive-xecolor-doc-svn29660.0.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827602" comment="texlive-xecyr-svn20221.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827603" comment="texlive-xecyr-doc-svn20221.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827604" comment="texlive-xeindex-svn16760.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827605" comment="texlive-xeindex-doc-svn16760.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827606" comment="texlive-xepersian-svn29661.12.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827607" comment="texlive-xepersian-doc-svn29661.12.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827608" comment="texlive-xesearch-svn16041.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827609" comment="texlive-xesearch-doc-svn16041.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827610" comment="texlive-xetex-svn26330.0.9997.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827611" comment="texlive-xetex-bin-svn26912.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827612" comment="texlive-xetex-def-svn29154.0.95-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827613" comment="texlive-xetex-doc-svn26330.0.9997.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827614" comment="texlive-xetex-itrans-svn24105.4.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827615" comment="texlive-xetex-itrans-doc-svn24105.4.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827616" comment="texlive-xetex-pstricks-svn17055.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827617" comment="texlive-xetex-pstricks-doc-svn17055.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827618" comment="texlive-xetex-tibetan-svn28847.0.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827619" comment="texlive-xetex-tibetan-doc-svn28847.0.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827620" comment="texlive-xetexconfig-svn28819.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827621" comment="texlive-xetexfontinfo-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827622" comment="texlive-xetexfontinfo-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827623" comment="texlive-xifthen-svn15878.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827624" comment="texlive-xifthen-doc-svn15878.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827625" comment="texlive-xkeyval-svn27995.2.6a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827626" comment="texlive-xkeyval-doc-svn27995.2.6a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827627" comment="texlive-xltxtra-svn19809.0.5e-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827628" comment="texlive-xltxtra-doc-svn19809.0.5e-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827629" comment="texlive-xmltex-svn28273.0.8-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827630" comment="texlive-xmltex-bin-svn3006.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827631" comment="texlive-xmltex-doc-svn28273.0.8-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827632" comment="texlive-xstring-svn29258.1.7a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827633" comment="texlive-xstring-doc-svn29258.1.7a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827634" comment="texlive-xtab-svn23347.2.3f-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827635" comment="texlive-xtab-doc-svn23347.2.3f-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827636" comment="texlive-xunicode-svn23897.0.981-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827637" comment="texlive-xunicode-doc-svn23897.0.981-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827638" comment="texlive-zapfchan-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827639" comment="texlive-zapfding-svn28614.0-45.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827092" comment="texlive-2012-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827093" comment="texlive-adjustbox-svn26555.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827094" comment="texlive-adjustbox-doc-svn26555.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827095" comment="texlive-ae-svn15878.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827096" comment="texlive-ae-doc-svn15878.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827097" comment="texlive-algorithms-svn15878.0.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827098" comment="texlive-algorithms-doc-svn15878.0.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827099" comment="texlive-amscls-svn29207.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827100" comment="texlive-amscls-doc-svn29207.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827101" comment="texlive-amsfonts-svn29208.3.04-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827102" comment="texlive-amsfonts-doc-svn29208.3.04-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827103" comment="texlive-amsmath-svn29327.2.14-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827104" comment="texlive-amsmath-doc-svn29327.2.14-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827105" comment="texlive-anysize-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827106" comment="texlive-anysize-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827107" comment="texlive-appendix-svn15878.1.2b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827108" comment="texlive-appendix-doc-svn15878.1.2b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827109" comment="texlive-arabxetex-svn17470.v1.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827110" comment="texlive-arabxetex-doc-svn17470.v1.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827111" comment="texlive-arphic-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827112" comment="texlive-arphic-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827113" comment="texlive-attachfile-svn21866.v1.5b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827114" comment="texlive-attachfile-doc-svn21866.v1.5b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827115" comment="texlive-avantgar-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827116" comment="texlive-babel-svn24756.3.8m-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827117" comment="texlive-babel-doc-svn24756.3.8m-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827118" comment="texlive-babelbib-svn25245.1.31-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827119" comment="texlive-babelbib-doc-svn25245.1.31-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827120" comment="texlive-base-2012-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827121" comment="texlive-beamer-svn29349.3.26-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827122" comment="texlive-beamer-doc-svn29349.3.26-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827123" comment="texlive-bera-svn20031.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827124" comment="texlive-bera-doc-svn20031.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827125" comment="texlive-beton-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827126" comment="texlive-beton-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827127" comment="texlive-bibtex-svn26689.0.99d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827128" comment="texlive-bibtex-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827129" comment="texlive-bibtex-doc-svn26689.0.99d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827130" comment="texlive-bibtopic-svn15878.1.1a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827131" comment="texlive-bibtopic-doc-svn15878.1.1a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827132" comment="texlive-bidi-svn29650.12.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827133" comment="texlive-bidi-doc-svn29650.12.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827134" comment="texlive-bigfoot-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827135" comment="texlive-bigfoot-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827136" comment="texlive-bookman-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827137" comment="texlive-booktabs-svn15878.1.61803-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827138" comment="texlive-booktabs-doc-svn15878.1.61803-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827139" comment="texlive-breakurl-svn15878.1.30-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827140" comment="texlive-breakurl-doc-svn15878.1.30-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827141" comment="texlive-caption-svn29026.3.3__2013_02_03_-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827142" comment="texlive-caption-doc-svn29026.3.3__2013_02_03_-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827143" comment="texlive-carlisle-svn18258.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827144" comment="texlive-carlisle-doc-svn18258.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827145" comment="texlive-changebar-svn29349.3.5c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827146" comment="texlive-changebar-doc-svn29349.3.5c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827147" comment="texlive-changepage-svn15878.1.0c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827148" comment="texlive-changepage-doc-svn15878.1.0c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827149" comment="texlive-charter-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827150" comment="texlive-charter-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827151" comment="texlive-chngcntr-svn17157.1.0a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827152" comment="texlive-chngcntr-doc-svn17157.1.0a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827153" comment="texlive-cite-svn19955.5.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827154" comment="texlive-cite-doc-svn19955.5.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827155" comment="texlive-cjk-svn26296.4.8.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827156" comment="texlive-cjk-doc-svn26296.4.8.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827157" comment="texlive-cm-svn29581.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827158" comment="texlive-cm-doc-svn29581.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827159" comment="texlive-cm-lgc-svn28250.0.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827160" comment="texlive-cm-lgc-doc-svn28250.0.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827161" comment="texlive-cm-super-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827162" comment="texlive-cm-super-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827163" comment="texlive-cmap-svn26568.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827164" comment="texlive-cmap-doc-svn26568.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827165" comment="texlive-cmextra-svn14075.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827166" comment="texlive-cns-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827167" comment="texlive-cns-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827168" comment="texlive-collectbox-svn26557.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827169" comment="texlive-collectbox-doc-svn26557.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827170" comment="texlive-collection-basic-svn26314.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827171" comment="texlive-collection-documentation-base-svn17091.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827172" comment="texlive-collection-fontsrecommended-svn28082.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827173" comment="texlive-collection-htmlxml-svn28251.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827174" comment="texlive-collection-latex-svn25030.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827175" comment="texlive-collection-latexrecommended-svn25795.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827176" comment="texlive-collection-xetex-svn29634.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827177" comment="texlive-colortbl-svn25394.v1.0a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827178" comment="texlive-colortbl-doc-svn25394.v1.0a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827179" comment="texlive-courier-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827180" comment="texlive-crop-svn15878.1.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827181" comment="texlive-crop-doc-svn15878.1.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827182" comment="texlive-csquotes-svn24393.5.1d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827183" comment="texlive-csquotes-doc-svn24393.5.1d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827184" comment="texlive-ctable-svn26694.1.23-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827185" comment="texlive-ctable-doc-svn26694.1.23-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827186" comment="texlive-currfile-svn29012.0.7b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827187" comment="texlive-currfile-doc-svn29012.0.7b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827188" comment="texlive-datetime-svn19834.2.58-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827189" comment="texlive-datetime-doc-svn19834.2.58-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827190" comment="texlive-dvipdfm-svn26689.0.13.2d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827191" comment="texlive-dvipdfm-bin-svn13663.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827192" comment="texlive-dvipdfm-doc-svn26689.0.13.2d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827193" comment="texlive-dvipdfmx-svn26765.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827194" comment="texlive-dvipdfmx-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827195" comment="texlive-dvipdfmx-def-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827196" comment="texlive-dvipdfmx-doc-svn26765.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827197" comment="texlive-dvipng-svn26689.1.14-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827198" comment="texlive-dvipng-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827199" comment="texlive-dvipng-doc-svn26689.1.14-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827200" comment="texlive-dvips-svn29585.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827201" comment="texlive-dvips-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827202" comment="texlive-dvips-doc-svn29585.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827203" comment="texlive-ec-svn25033.1.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827204" comment="texlive-ec-doc-svn25033.1.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827205" comment="texlive-eepic-svn15878.1.1e-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827206" comment="texlive-eepic-doc-svn15878.1.1e-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827207" comment="texlive-enctex-svn28602.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827208" comment="texlive-enctex-doc-svn28602.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827209" comment="texlive-enumitem-svn24146.3.5.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827210" comment="texlive-enumitem-doc-svn24146.3.5.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827211" comment="texlive-epsf-svn21461.2.7.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827212" comment="texlive-epsf-doc-svn21461.2.7.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827213" comment="texlive-epstopdf-svn26577.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827214" comment="texlive-epstopdf-bin-svn18336.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827215" comment="texlive-epstopdf-doc-svn26577.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827216" comment="texlive-eso-pic-svn21515.2.0c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827217" comment="texlive-eso-pic-doc-svn21515.2.0c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827218" comment="texlive-etex-svn22198.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827219" comment="texlive-etex-doc-svn22198.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827220" comment="texlive-etex-pkg-svn15878.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827221" comment="texlive-etex-pkg-doc-svn15878.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827222" comment="texlive-etoolbox-svn20922.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827223" comment="texlive-etoolbox-doc-svn20922.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827224" comment="texlive-euenc-svn19795.0.1h-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827225" comment="texlive-euenc-doc-svn19795.0.1h-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827226" comment="texlive-euler-svn17261.2.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827227" comment="texlive-euler-doc-svn17261.2.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827228" comment="texlive-euro-svn22191.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827229" comment="texlive-euro-doc-svn22191.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827230" comment="texlive-eurosym-svn17265.1.4_subrfix-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827231" comment="texlive-eurosym-doc-svn17265.1.4_subrfix-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827232" comment="texlive-extsizes-svn17263.1.4a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827233" comment="texlive-extsizes-doc-svn17263.1.4a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827234" comment="texlive-fancybox-svn18304.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827235" comment="texlive-fancybox-doc-svn18304.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827236" comment="texlive-fancyhdr-svn15878.3.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827237" comment="texlive-fancyhdr-doc-svn15878.3.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827238" comment="texlive-fancyref-svn15878.0.9c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827239" comment="texlive-fancyref-doc-svn15878.0.9c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827240" comment="texlive-fancyvrb-svn18492.2.8-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827241" comment="texlive-fancyvrb-doc-svn18492.2.8-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827242" comment="texlive-filecontents-svn24250.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827243" comment="texlive-filecontents-doc-svn24250.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827244" comment="texlive-filehook-svn24280.0.5d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827245" comment="texlive-filehook-doc-svn24280.0.5d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827246" comment="texlive-fix2col-svn17133.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827247" comment="texlive-fix2col-doc-svn17133.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827248" comment="texlive-fixlatvian-svn21631.1a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827249" comment="texlive-fixlatvian-doc-svn21631.1a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827250" comment="texlive-float-svn15878.1.3d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827251" comment="texlive-float-doc-svn15878.1.3d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827252" comment="texlive-fmtcount-svn28068.2.02-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827253" comment="texlive-fmtcount-doc-svn28068.2.02-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827254" comment="texlive-fncychap-svn20710.v1.34-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827255" comment="texlive-fncychap-doc-svn20710.v1.34-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827256" comment="texlive-fontbook-svn23608.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827257" comment="texlive-fontbook-doc-svn23608.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827258" comment="texlive-fontspec-svn29412.v2.3a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827259" comment="texlive-fontspec-doc-svn29412.v2.3a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827260" comment="texlive-fontware-svn26689.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827261" comment="texlive-fontware-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827262" comment="texlive-fontwrap-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827263" comment="texlive-fontwrap-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827264" comment="texlive-footmisc-svn23330.5.5b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827265" comment="texlive-footmisc-doc-svn23330.5.5b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827266" comment="texlive-fp-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827267" comment="texlive-fp-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827268" comment="texlive-fpl-svn15878.1.002-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827269" comment="texlive-fpl-doc-svn15878.1.002-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827270" comment="texlive-framed-svn26789.0.96-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827271" comment="texlive-framed-doc-svn26789.0.96-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827272" comment="texlive-garuda-c90-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827273" comment="texlive-geometry-svn19716.5.6-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827274" comment="texlive-geometry-doc-svn19716.5.6-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827275" comment="texlive-glyphlist-svn28576.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827276" comment="texlive-graphics-svn25405.1.0o-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827277" comment="texlive-graphics-doc-svn25405.1.0o-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827278" comment="texlive-gsftopk-svn26689.1.19.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827279" comment="texlive-gsftopk-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827280" comment="texlive-helvetic-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827281" comment="texlive-hyperref-svn28213.6.83m-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827282" comment="texlive-hyperref-doc-svn28213.6.83m-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827283" comment="texlive-hyph-utf8-svn29641.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827284" comment="texlive-hyph-utf8-doc-svn29641.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827285" comment="texlive-hyphen-base-svn29197.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827286" comment="texlive-hyphenat-svn15878.2.3c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827287" comment="texlive-hyphenat-doc-svn15878.2.3c-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827288" comment="texlive-ifetex-svn24853.1.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827289" comment="texlive-ifetex-doc-svn24853.1.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827290" comment="texlive-ifluatex-svn26725.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827291" comment="texlive-ifluatex-doc-svn26725.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827292" comment="texlive-ifmtarg-svn19363.1.2a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827293" comment="texlive-ifmtarg-doc-svn19363.1.2a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827294" comment="texlive-ifoddpage-svn23979.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827295" comment="texlive-ifoddpage-doc-svn23979.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827296" comment="texlive-iftex-svn29654.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827297" comment="texlive-iftex-doc-svn29654.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827298" comment="texlive-ifxetex-svn19685.0.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827299" comment="texlive-ifxetex-doc-svn19685.0.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827300" comment="texlive-index-svn24099.4.1beta-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827301" comment="texlive-index-doc-svn24099.4.1beta-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827302" comment="texlive-jadetex-svn23409.3.13-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827303" comment="texlive-jadetex-bin-svn3006.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827304" comment="texlive-jadetex-doc-svn23409.3.13-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827305" comment="texlive-jknapltx-svn19440.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827306" comment="texlive-jknapltx-doc-svn19440.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827307" comment="texlive-kastrup-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827308" comment="texlive-kastrup-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827309" comment="texlive-kerkis-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827310" comment="texlive-kerkis-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827311" comment="texlive-koma-script-svn27255.3.11b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827312" comment="texlive-kpathsea-svn28792.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827313" comment="texlive-kpathsea-bin-svn27347.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827314" comment="texlive-kpathsea-doc-svn28792.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827315" comment="texlive-kpathsea-lib-2012-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827316" comment="texlive-kpathsea-lib-devel-2012-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827317" comment="texlive-l3experimental-svn29361.SVN_4467-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827318" comment="texlive-l3experimental-doc-svn29361.SVN_4467-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827319" comment="texlive-l3kernel-svn29409.SVN_4469-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827320" comment="texlive-l3kernel-doc-svn29409.SVN_4469-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827321" comment="texlive-l3packages-svn29361.SVN_4467-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827322" comment="texlive-l3packages-doc-svn29361.SVN_4467-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827323" comment="texlive-lastpage-svn28985.1.2l-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827324" comment="texlive-lastpage-doc-svn28985.1.2l-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827325" comment="texlive-latex-svn27907.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827326" comment="texlive-latex-bin-svn26689.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827327" comment="texlive-latex-bin-bin-svn14050.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827328" comment="texlive-latex-doc-svn27907.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827329" comment="texlive-latex-fonts-svn28888.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827330" comment="texlive-latex-fonts-doc-svn28888.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827331" comment="texlive-latexconfig-svn28991.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827332" comment="texlive-lettrine-svn29391.1.64-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827333" comment="texlive-lettrine-doc-svn29391.1.64-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827334" comment="texlive-listings-svn15878.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827335" comment="texlive-listings-doc-svn15878.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827336" comment="texlive-lm-svn28119.2.004-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827337" comment="texlive-lm-doc-svn28119.2.004-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827338" comment="texlive-lm-math-svn29044.1.958-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827339" comment="texlive-lm-math-doc-svn29044.1.958-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827340" comment="texlive-ltxmisc-svn21927.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827341" comment="texlive-lua-alt-getopt-svn29349.0.7.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827342" comment="texlive-lua-alt-getopt-doc-svn29349.0.7.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827343" comment="texlive-lualatex-math-svn29346.1.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827344" comment="texlive-lualatex-math-doc-svn29346.1.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827345" comment="texlive-luaotfload-svn26718.1.26-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827346" comment="texlive-luaotfload-bin-svn18579.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827347" comment="texlive-luaotfload-doc-svn26718.1.26-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827348" comment="texlive-luatex-svn26689.0.70.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827349" comment="texlive-luatex-bin-svn26912.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827350" comment="texlive-luatex-doc-svn26689.0.70.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827351" comment="texlive-luatexbase-svn22560.0.31-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827352" comment="texlive-luatexbase-doc-svn22560.0.31-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827353" comment="texlive-makecmds-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827354" comment="texlive-makecmds-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827355" comment="texlive-makeindex-svn26689.2.12-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827356" comment="texlive-makeindex-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827357" comment="texlive-makeindex-doc-svn26689.2.12-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827358" comment="texlive-marginnote-svn25880.v1.1i-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827359" comment="texlive-marginnote-doc-svn25880.v1.1i-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827360" comment="texlive-marvosym-svn29349.2.2a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827361" comment="texlive-marvosym-doc-svn29349.2.2a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827362" comment="texlive-mathpazo-svn15878.1.003-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827363" comment="texlive-mathpazo-doc-svn15878.1.003-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827364" comment="texlive-mathspec-svn15878.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827365" comment="texlive-mathspec-doc-svn15878.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827366" comment="texlive-mdwtools-svn15878.1.05.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827367" comment="texlive-mdwtools-doc-svn15878.1.05.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827368" comment="texlive-memoir-svn21638.3.6j_patch_6.0g-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827369" comment="texlive-memoir-doc-svn21638.3.6j_patch_6.0g-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827370" comment="texlive-metafont-svn26689.2.718281-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827371" comment="texlive-metafont-bin-svn26912.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827372" comment="texlive-metalogo-svn18611.0.12-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827373" comment="texlive-metalogo-doc-svn18611.0.12-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827374" comment="texlive-metapost-svn26689.1.212-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827375" comment="texlive-metapost-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827376" comment="texlive-metapost-doc-svn26689.1.212-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827377" comment="texlive-metapost-examples-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827378" comment="texlive-mflogo-svn17487.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827379" comment="texlive-mflogo-doc-svn17487.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827380" comment="texlive-mfnfss-svn19410.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827381" comment="texlive-mfnfss-doc-svn19410.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827382" comment="texlive-mfware-svn26689.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827383" comment="texlive-mfware-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827384" comment="texlive-mh-svn29420.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827385" comment="texlive-mh-doc-svn29420.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827386" comment="texlive-microtype-svn29392.2.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827387" comment="texlive-microtype-doc-svn29392.2.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827388" comment="texlive-misc-svn24955.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827389" comment="texlive-mnsymbol-svn18651.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827390" comment="texlive-mnsymbol-doc-svn18651.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827391" comment="texlive-mparhack-svn15878.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827392" comment="texlive-mparhack-doc-svn15878.1.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827393" comment="texlive-mptopdf-svn26689.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827394" comment="texlive-mptopdf-bin-svn18674.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827395" comment="texlive-ms-svn24467.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827396" comment="texlive-ms-doc-svn24467.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827397" comment="texlive-multido-svn18302.1.42-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827398" comment="texlive-multido-doc-svn18302.1.42-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827399" comment="texlive-multirow-svn17256.1.6-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827400" comment="texlive-multirow-doc-svn17256.1.6-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827401" comment="texlive-natbib-svn20668.8.31b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827402" comment="texlive-natbib-doc-svn20668.8.31b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827403" comment="texlive-ncctools-svn15878.3.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827404" comment="texlive-ncctools-doc-svn15878.3.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827405" comment="texlive-ncntrsbk-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827406" comment="texlive-norasi-c90-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827407" comment="texlive-ntgclass-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827408" comment="texlive-ntgclass-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827409" comment="texlive-oberdiek-svn26725.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827410" comment="texlive-oberdiek-doc-svn26725.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827411" comment="texlive-overpic-svn19712.0.53-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827412" comment="texlive-overpic-doc-svn19712.0.53-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827413" comment="texlive-palatino-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827414" comment="texlive-paralist-svn15878.2.3b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827415" comment="texlive-paralist-doc-svn15878.2.3b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827416" comment="texlive-parallel-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827417" comment="texlive-parallel-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827418" comment="texlive-parskip-svn19963.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827419" comment="texlive-parskip-doc-svn19963.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827420" comment="texlive-passivetex-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827421" comment="texlive-pdfpages-svn27574.0.4t-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827422" comment="texlive-pdfpages-doc-svn27574.0.4t-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827423" comment="texlive-pdftex-svn29585.1.40.11-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827424" comment="texlive-pdftex-bin-svn27321.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827425" comment="texlive-pdftex-def-svn22653.0.06d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827426" comment="texlive-pdftex-doc-svn29585.1.40.11-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827427" comment="texlive-pgf-svn22614.2.10-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827428" comment="texlive-pgf-doc-svn22614.2.10-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827429" comment="texlive-philokalia-svn18651.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827430" comment="texlive-philokalia-doc-svn18651.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827431" comment="texlive-placeins-svn19848.2.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827432" comment="texlive-placeins-doc-svn19848.2.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827433" comment="texlive-plain-svn26647.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827434" comment="texlive-polyglossia-svn26163.v1.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827435" comment="texlive-polyglossia-doc-svn26163.v1.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827436" comment="texlive-powerdot-svn25656.1.4i-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827437" comment="texlive-powerdot-doc-svn25656.1.4i-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827438" comment="texlive-preprint-svn16085.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827439" comment="texlive-preprint-doc-svn16085.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827440" comment="texlive-psfrag-svn15878.3.04-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827441" comment="texlive-psfrag-doc-svn15878.3.04-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827442" comment="texlive-pslatex-svn16416.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827443" comment="texlive-psnfss-svn23394.9.2a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827444" comment="texlive-psnfss-doc-svn23394.9.2a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827445" comment="texlive-pspicture-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827446" comment="texlive-pspicture-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827447" comment="texlive-pst-3d-svn17257.1.10-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827448" comment="texlive-pst-3d-doc-svn17257.1.10-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827449" comment="texlive-pst-blur-svn15878.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827450" comment="texlive-pst-blur-doc-svn15878.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827451" comment="texlive-pst-coil-svn24020.1.06-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827452" comment="texlive-pst-coil-doc-svn24020.1.06-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827453" comment="texlive-pst-eps-svn15878.1.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827454" comment="texlive-pst-eps-doc-svn15878.1.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827455" comment="texlive-pst-fill-svn15878.1.01-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827456" comment="texlive-pst-fill-doc-svn15878.1.01-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827457" comment="texlive-pst-grad-svn15878.1.06-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827458" comment="texlive-pst-grad-doc-svn15878.1.06-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827459" comment="texlive-pst-math-svn20176.0.61-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827460" comment="texlive-pst-math-doc-svn20176.0.61-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827461" comment="texlive-pst-node-svn27799.1.25-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827462" comment="texlive-pst-node-doc-svn27799.1.25-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827463" comment="texlive-pst-plot-svn28729.1.44-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827464" comment="texlive-pst-plot-doc-svn28729.1.44-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827465" comment="texlive-pst-slpe-svn24391.1.31-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827466" comment="texlive-pst-slpe-doc-svn24391.1.31-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827467" comment="texlive-pst-text-svn15878.1.00-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827468" comment="texlive-pst-text-doc-svn15878.1.00-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827469" comment="texlive-pst-tree-svn24142.1.12-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827470" comment="texlive-pst-tree-doc-svn24142.1.12-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827471" comment="texlive-pstricks-svn29678.2.39-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827472" comment="texlive-pstricks-add-svn28750.3.59-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827473" comment="texlive-pstricks-add-doc-svn28750.3.59-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827474" comment="texlive-pstricks-doc-svn29678.2.39-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827475" comment="texlive-ptext-svn28124.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827476" comment="texlive-ptext-doc-svn28124.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827477" comment="texlive-pxfonts-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827478" comment="texlive-pxfonts-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827479" comment="texlive-qstest-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827480" comment="texlive-qstest-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827481" comment="texlive-rcs-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827482" comment="texlive-rcs-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827483" comment="texlive-realscripts-svn29423.0.3b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827484" comment="texlive-realscripts-doc-svn29423.0.3b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827485" comment="texlive-rotating-svn16832.2.16b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827486" comment="texlive-rotating-doc-svn16832.2.16b-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827487" comment="texlive-rsfs-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827488" comment="texlive-rsfs-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827489" comment="texlive-sansmath-svn17997.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827490" comment="texlive-sansmath-doc-svn17997.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827491" comment="texlive-sauerj-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827492" comment="texlive-sauerj-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827493" comment="texlive-scheme-basic-svn25923.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827494" comment="texlive-section-svn20180.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827495" comment="texlive-section-doc-svn20180.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827496" comment="texlive-sectsty-svn15878.2.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827497" comment="texlive-sectsty-doc-svn15878.2.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827498" comment="texlive-seminar-svn18322.1.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827499" comment="texlive-seminar-doc-svn18322.1.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827500" comment="texlive-sepnum-svn20186.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827501" comment="texlive-sepnum-doc-svn20186.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827502" comment="texlive-setspace-svn24881.6.7a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827503" comment="texlive-setspace-doc-svn24881.6.7a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827504" comment="texlive-showexpl-svn27790.v0.3j-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827505" comment="texlive-showexpl-doc-svn27790.v0.3j-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827506" comment="texlive-soul-svn15878.2.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827507" comment="texlive-soul-doc-svn15878.2.4-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827508" comment="texlive-stmaryrd-svn22027.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827509" comment="texlive-stmaryrd-doc-svn22027.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827510" comment="texlive-subfig-svn15878.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827511" comment="texlive-subfig-doc-svn15878.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827512" comment="texlive-subfigure-svn15878.2.1.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827513" comment="texlive-subfigure-doc-svn15878.2.1.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827514" comment="texlive-svn-prov-svn18017.3.1862-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827515" comment="texlive-svn-prov-doc-svn18017.3.1862-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827516" comment="texlive-symbol-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827517" comment="texlive-t2-svn29349.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827518" comment="texlive-t2-doc-svn29349.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827519" comment="texlive-tetex-svn29585.3.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827520" comment="texlive-tetex-bin-svn27344.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827521" comment="texlive-tetex-doc-svn29585.3.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827522" comment="texlive-tex-svn26689.3.1415926-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827523" comment="texlive-tex-bin-svn26912.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827524" comment="texlive-tex-gyre-svn18651.2.004-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827525" comment="texlive-tex-gyre-doc-svn18651.2.004-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827526" comment="texlive-tex-gyre-math-svn29045.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827527" comment="texlive-tex-gyre-math-doc-svn29045.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827528" comment="texlive-tex4ht-svn29474.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827529" comment="texlive-tex4ht-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827530" comment="texlive-tex4ht-doc-svn29474.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827531" comment="texlive-texconfig-svn29349.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827532" comment="texlive-texconfig-bin-svn27344.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827533" comment="texlive-texlive.infra-svn28217.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827534" comment="texlive-texlive.infra-bin-svn22566.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827535" comment="texlive-texlive.infra-doc-svn28217.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827536" comment="texlive-textcase-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827537" comment="texlive-textcase-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827538" comment="texlive-textpos-svn28261.1.7h-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827539" comment="texlive-textpos-doc-svn28261.1.7h-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827540" comment="texlive-thailatex-svn29349.0.5.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827541" comment="texlive-thailatex-doc-svn29349.0.5.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827542" comment="texlive-threeparttable-svn17383.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827543" comment="texlive-threeparttable-doc-svn17383.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827544" comment="texlive-thumbpdf-svn26689.3.15-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827545" comment="texlive-thumbpdf-bin-svn6898.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827546" comment="texlive-thumbpdf-doc-svn26689.3.15-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827547" comment="texlive-times-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827548" comment="texlive-tipa-svn29349.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827549" comment="texlive-tipa-doc-svn29349.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827550" comment="texlive-titlesec-svn24852.2.10.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827551" comment="texlive-titlesec-doc-svn24852.2.10.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827552" comment="texlive-titling-svn15878.2.1d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827553" comment="texlive-titling-doc-svn15878.2.1d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827554" comment="texlive-tocloft-svn20084.2.3e-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827555" comment="texlive-tocloft-doc-svn20084.2.3e-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827556" comment="texlive-tools-svn26263.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827557" comment="texlive-tools-doc-svn26263.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827558" comment="texlive-txfonts-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827559" comment="texlive-txfonts-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827560" comment="texlive-type1cm-svn21820.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827561" comment="texlive-type1cm-doc-svn21820.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827562" comment="texlive-typehtml-svn17134.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827563" comment="texlive-typehtml-doc-svn17134.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827564" comment="texlive-ucharclasses-svn27820.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827565" comment="texlive-ucharclasses-doc-svn27820.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827566" comment="texlive-ucs-svn27549.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827567" comment="texlive-ucs-doc-svn27549.2.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827568" comment="texlive-uhc-svn16791.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827569" comment="texlive-uhc-doc-svn16791.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827570" comment="texlive-ulem-svn26785.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827571" comment="texlive-ulem-doc-svn26785.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827572" comment="texlive-underscore-svn18261.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827573" comment="texlive-underscore-doc-svn18261.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827574" comment="texlive-unicode-math-svn29413.0.7d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827575" comment="texlive-unicode-math-doc-svn29413.0.7d-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827576" comment="texlive-unisugar-svn22357.0.92-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827577" comment="texlive-unisugar-doc-svn22357.0.92-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827578" comment="texlive-url-svn16864.3.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827579" comment="texlive-url-doc-svn16864.3.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827580" comment="texlive-utopia-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827581" comment="texlive-utopia-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827582" comment="texlive-varwidth-svn24104.0.92-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827583" comment="texlive-varwidth-doc-svn24104.0.92-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827584" comment="texlive-wadalab-svn22576.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827585" comment="texlive-wadalab-doc-svn22576.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827586" comment="texlive-was-svn21439.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827587" comment="texlive-was-doc-svn21439.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827588" comment="texlive-wasy-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827589" comment="texlive-wasy-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827590" comment="texlive-wasysym-svn15878.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827591" comment="texlive-wasysym-doc-svn15878.2.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827592" comment="texlive-wrapfig-svn22048.3.6-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827593" comment="texlive-wrapfig-doc-svn22048.3.6-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827594" comment="texlive-xcolor-svn15878.2.11-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827595" comment="texlive-xcolor-doc-svn15878.2.11-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827596" comment="texlive-xdvi-svn26689.22.85-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827597" comment="texlive-xdvi-bin-svn26509.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827598" comment="texlive-xecjk-svn28816.3.1.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827599" comment="texlive-xecjk-doc-svn28816.3.1.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827600" comment="texlive-xecolor-svn29660.0.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827601" comment="texlive-xecolor-doc-svn29660.0.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827602" comment="texlive-xecyr-svn20221.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827603" comment="texlive-xecyr-doc-svn20221.1.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827604" comment="texlive-xeindex-svn16760.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827605" comment="texlive-xeindex-doc-svn16760.0.2-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827606" comment="texlive-xepersian-svn29661.12.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827607" comment="texlive-xepersian-doc-svn29661.12.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827608" comment="texlive-xesearch-svn16041.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827609" comment="texlive-xesearch-doc-svn16041.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827610" comment="texlive-xetex-svn26330.0.9997.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827611" comment="texlive-xetex-bin-svn26912.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827612" comment="texlive-xetex-def-svn29154.0.95-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827613" comment="texlive-xetex-doc-svn26330.0.9997.5-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827614" comment="texlive-xetex-itrans-svn24105.4.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827615" comment="texlive-xetex-itrans-doc-svn24105.4.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827616" comment="texlive-xetex-pstricks-svn17055.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827617" comment="texlive-xetex-pstricks-doc-svn17055.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827618" comment="texlive-xetex-tibetan-svn28847.0.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827619" comment="texlive-xetex-tibetan-doc-svn28847.0.1-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827620" comment="texlive-xetexconfig-svn28819.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827621" comment="texlive-xetexfontinfo-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827622" comment="texlive-xetexfontinfo-doc-svn15878.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827623" comment="texlive-xifthen-svn15878.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827624" comment="texlive-xifthen-doc-svn15878.1.3-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827625" comment="texlive-xkeyval-svn27995.2.6a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827626" comment="texlive-xkeyval-doc-svn27995.2.6a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827627" comment="texlive-xltxtra-svn19809.0.5e-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827628" comment="texlive-xltxtra-doc-svn19809.0.5e-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827629" comment="texlive-xmltex-svn28273.0.8-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827630" comment="texlive-xmltex-bin-svn3006.0-45.20130427_r30134.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827631" comment="texlive-xmltex-doc-svn28273.0.8-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827632" comment="texlive-xstring-svn29258.1.7a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827633" comment="texlive-xstring-doc-svn29258.1.7a-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827634" comment="texlive-xtab-svn23347.2.3f-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827635" comment="texlive-xtab-doc-svn23347.2.3f-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827636" comment="texlive-xunicode-svn23897.0.981-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827637" comment="texlive-xunicode-doc-svn23897.0.981-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827638" comment="texlive-zapfchan-svn28614.0-45.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827639" comment="texlive-zapfding-svn28614.0-45.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:889" version="1" class="patch">
	<metadata>
		<title>security update for advancecomp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-9210" ref_url="https://www.suse.com/security/cve/CVE-2019-9210/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1037.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1037.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9210/">CVE-2019-9210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9210">CVE-2019-9210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827640" comment="advancecomp-1.15-22.el7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827640" comment="advancecomp-1.15-22.el7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:890" version="1" class="patch">
	<metadata>
		<title>security update for lftp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-10916" ref_url="https://www.suse.com/security/cve/CVE-2018-10916/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1045.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1045.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10916/">CVE-2018-10916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10916">CVE-2018-10916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827641" comment="lftp-4.4.8-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827642" comment="lftp-scripts-4.4.8-12.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:891" version="1" class="patch">
	<metadata>
		<title>security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-19622" ref_url="https://www.suse.com/security/cve/CVE-2018-19622/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1047.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1047.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11362">CVE-2018-11362 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14340">CVE-2018-14340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14341">CVE-2018-14341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14368">CVE-2018-14368 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16057">CVE-2018-16057 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19622/">CVE-2018-19622 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19622">CVE-2018-19622 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7418">CVE-2018-7418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827643" comment="wireshark-1.10.14-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827644" comment="wireshark-devel-1.10.14-24.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827645" comment="wireshark-gnome-1.10.14-24.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:892" version="1" class="patch">
	<metadata>
		<title>security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4700" ref_url="https://www.suse.com/security/cve/CVE-2018-4700/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1050.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1050.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4180">CVE-2018-4180 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-4181">CVE-2018-4181 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4700/">CVE-2018-4700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-4700">CVE-2018-4700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827646" comment="cups-1.6.3-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827647" comment="cups-client-1.6.3-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827648" comment="cups-devel-1.6.3-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827649" comment="cups-filesystem-1.6.3-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827650" comment="cups-ipptool-1.6.3-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827651" comment="cups-libs-1.6.3-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827652" comment="cups-lpd-1.6.3-43.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:893" version="1" class="patch">
	<metadata>
		<title>security update for libosinfo (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-13313" ref_url="https://www.suse.com/security/cve/CVE-2019-13313/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1051.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1051.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13313/">CVE-2019-13313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13313">CVE-2019-13313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827653" comment="libosinfo-1.1.0-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827654" comment="libosinfo-devel-1.1.0-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827655" comment="libosinfo-vala-1.1.0-5.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827653" comment="libosinfo-1.1.0-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827654" comment="libosinfo-devel-1.1.0-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827655" comment="libosinfo-vala-1.1.0-5.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:894" version="1" class="patch">
	<metadata>
		<title>security update for mailman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-0618" ref_url="https://www.suse.com/security/cve/CVE-2018-0618/" source="CVE"/>
		<reference ref_id="CVE-2018-13796" ref_url="https://www.suse.com/security/cve/CVE-2018-13796/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1054.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1054.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0618/">CVE-2018-0618 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0618">CVE-2018-0618 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13796/">CVE-2018-13796 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13796">CVE-2018-13796 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827656" comment="mailman-2.1.15-30.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:895" version="1" class="patch">
	<metadata>
		<title>security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<reference ref_id="CVE-2019-6477" ref_url="https://www.suse.com/security/cve/CVE-2019-6477/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1061.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1061.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-5745">CVE-2018-5745 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6465">CVE-2019-6465 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6477/">CVE-2019-6477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6477">CVE-2019-6477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827657" comment="bind-9.11.4-16.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827658" comment="bind-chroot-9.11.4-16.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827659" comment="bind-devel-9.11.4-16.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827660" comment="bind-export-devel-9.11.4-16.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827661" comment="bind-export-libs-9.11.4-16.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827662" comment="bind-libs-9.11.4-16.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827663" comment="bind-libs-lite-9.11.4-16.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827664" comment="bind-license-9.11.4-16.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827665" comment="bind-lite-devel-9.11.4-16.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827666" comment="bind-pkcs11-9.11.4-16.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827667" comment="bind-pkcs11-devel-9.11.4-16.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827668" comment="bind-pkcs11-libs-9.11.4-16.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827669" comment="bind-pkcs11-utils-9.11.4-16.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827670" comment="bind-sdb-9.11.4-16.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827671" comment="bind-sdb-chroot-9.11.4-16.P2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827672" comment="bind-utils-9.11.4-16.P2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:896" version="1" class="patch">
	<metadata>
		<title>security update for dovecot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-3814" ref_url="https://www.suse.com/security/cve/CVE-2019-3814/" source="CVE"/>
		<reference ref_id="CVE-2019-7524" ref_url="https://www.suse.com/security/cve/CVE-2019-7524/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1062.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1062.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3814/">CVE-2019-3814 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3814">CVE-2019-3814 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7524/">CVE-2019-7524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7524">CVE-2019-7524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827673" comment="dovecot-2.2.36-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827674" comment="dovecot-devel-2.2.36-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827675" comment="dovecot-mysql-2.2.36-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827676" comment="dovecot-pgsql-2.2.36-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827677" comment="dovecot-pigeonhole-2.2.36-6.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:897" version="1" class="patch">
	<metadata>
		<title>security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1000024" ref_url="https://www.suse.com/security/cve/CVE-2018-1000024/" source="CVE"/>
		<reference ref_id="CVE-2018-1000027" ref_url="https://www.suse.com/security/cve/CVE-2018-1000027/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1068.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1068.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000024/">CVE-2018-1000024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000024">CVE-2018-1000024 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000027/">CVE-2018-1000027 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000027">CVE-2018-1000027 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13345">CVE-2019-13345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827678" comment="squid-3.5.20-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827679" comment="squid-migration-script-3.5.20-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827680" comment="squid-sysvinit-3.5.20-15.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:898" version="1" class="patch">
	<metadata>
		<title>security update for evince (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-21009" ref_url="https://www.suse.com/security/cve/CVE-2018-21009/" source="CVE"/>
		<reference ref_id="CVE-2019-10871" ref_url="https://www.suse.com/security/cve/CVE-2019-10871/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<reference ref_id="CVE-2019-12293" ref_url="https://www.suse.com/security/cve/CVE-2019-12293/" source="CVE"/>
		<reference ref_id="CVE-2019-9959" ref_url="https://www.suse.com/security/cve/CVE-2019-9959/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1074.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1074.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-21009/">CVE-2018-21009 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21009">CVE-2018-21009 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10871/">CVE-2019-10871 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10871">CVE-2019-10871 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11459">CVE-2019-11459 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12293/">CVE-2019-12293 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12293">CVE-2019-12293 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9959/">CVE-2019-9959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9959">CVE-2019-9959 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827681" comment="evince-3.28.2-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827682" comment="evince-browser-plugin-3.28.2-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827683" comment="evince-devel-3.28.2-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827684" comment="evince-dvi-3.28.2-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827685" comment="evince-libs-3.28.2-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827686" comment="evince-nautilus-3.28.2-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827687" comment="poppler-0.26.5-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827688" comment="poppler-cpp-0.26.5-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827689" comment="poppler-cpp-devel-0.26.5-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827690" comment="poppler-demos-0.26.5-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827691" comment="poppler-devel-0.26.5-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827692" comment="poppler-glib-0.26.5-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827693" comment="poppler-glib-devel-0.26.5-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827694" comment="poppler-qt-0.26.5-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827695" comment="poppler-qt-devel-0.26.5-42.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827696" comment="poppler-utils-0.26.5-42.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:899" version="1" class="patch">
	<metadata>
		<title>security update for atk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-15587" ref_url="https://www.suse.com/security/cve/CVE-2018-15587/" source="CVE"/>
		<reference ref_id="CVE-2019-3890" ref_url="https://www.suse.com/security/cve/CVE-2019-3890/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1080.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1080.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15587/">CVE-2018-15587 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15587">CVE-2018-15587 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3890/">CVE-2019-3890 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3890">CVE-2019-3890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827697" comment="atk-2.28.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827698" comment="atk-devel-2.28.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827699" comment="evolution-3.28.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827700" comment="evolution-bogofilter-3.28.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827701" comment="evolution-data-server-3.28.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827702" comment="evolution-data-server-devel-3.28.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827703" comment="evolution-data-server-doc-3.28.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827704" comment="evolution-data-server-langpacks-3.28.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827705" comment="evolution-data-server-perl-3.28.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827706" comment="evolution-data-server-tests-3.28.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827707" comment="evolution-devel-3.28.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827708" comment="evolution-devel-docs-3.28.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827709" comment="evolution-ews-3.28.5-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827710" comment="evolution-ews-langpacks-3.28.5-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827711" comment="evolution-help-3.28.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827712" comment="evolution-langpacks-3.28.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827713" comment="evolution-pst-3.28.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827714" comment="evolution-spamassassin-3.28.5-8.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827697" comment="atk-2.28.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827698" comment="atk-devel-2.28.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827699" comment="evolution-3.28.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827700" comment="evolution-bogofilter-3.28.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827701" comment="evolution-data-server-3.28.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827702" comment="evolution-data-server-devel-3.28.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827703" comment="evolution-data-server-doc-3.28.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827704" comment="evolution-data-server-langpacks-3.28.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827705" comment="evolution-data-server-perl-3.28.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827706" comment="evolution-data-server-tests-3.28.5-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827707" comment="evolution-devel-3.28.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827708" comment="evolution-devel-docs-3.28.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827709" comment="evolution-ews-3.28.5-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827710" comment="evolution-ews-langpacks-3.28.5-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827711" comment="evolution-help-3.28.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827712" comment="evolution-langpacks-3.28.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827713" comment="evolution-pst-3.28.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827714" comment="evolution-spamassassin-3.28.5-8.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:900" version="1" class="patch">
	<metadata>
		<title>security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18066" ref_url="https://www.suse.com/security/cve/CVE-2018-18066/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1081.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1081.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18066/">CVE-2018-18066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18066">CVE-2018-18066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827715" comment="net-snmp-5.7.2-47.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827716" comment="net-snmp-agent-libs-5.7.2-47.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827717" comment="net-snmp-devel-5.7.2-47.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827718" comment="net-snmp-gui-5.7.2-47.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827719" comment="net-snmp-libs-5.7.2-47.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827720" comment="net-snmp-perl-5.7.2-47.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827721" comment="net-snmp-python-5.7.2-47.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827722" comment="net-snmp-sysvinit-5.7.2-47.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827723" comment="net-snmp-utils-5.7.2-47.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:901" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-10197" ref_url="https://www.suse.com/security/cve/CVE-2019-10197/" source="CVE"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1084.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1084.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10197/">CVE-2019-10197 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10197">CVE-2019-10197 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10218">CVE-2019-10218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827724" comment="ctdb-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827725" comment="ctdb-tests-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827726" comment="libsmbclient-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827727" comment="libsmbclient-devel-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827728" comment="libwbclient-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827729" comment="libwbclient-devel-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827730" comment="samba-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827731" comment="samba-client-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827732" comment="samba-client-libs-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827733" comment="samba-common-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827734" comment="samba-common-libs-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827735" comment="samba-common-tools-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827736" comment="samba-dc-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827737" comment="samba-dc-libs-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827738" comment="samba-devel-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827739" comment="samba-krb5-printing-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827740" comment="samba-libs-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827741" comment="samba-pidl-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827742" comment="samba-python-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827743" comment="samba-python-test-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827744" comment="samba-test-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827745" comment="samba-test-libs-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827746" comment="samba-vfs-glusterfs-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827747" comment="samba-winbind-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827748" comment="samba-winbind-clients-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827749" comment="samba-winbind-krb5-locator-4.10.4-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827750" comment="samba-winbind-modules-4.10.4-10.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:902" version="1" class="patch">
	<metadata>
		<title>security update for python-twisted-web (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-12387" ref_url="https://www.suse.com/security/cve/CVE-2019-12387/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1091.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1091.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12387/">CVE-2019-12387 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12387">CVE-2019-12387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827751" comment="python-twisted-web-12.1.0-6.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:903" version="1" class="patch">
	<metadata>
		<title>security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737/" source="CVE"/>
		<reference ref_id="CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739/" source="CVE"/>
		<reference ref_id="CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1100.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1100.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2737">CVE-2019-2737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2739">CVE-2019-2739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2740">CVE-2019-2740 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2805">CVE-2019-2805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827752" comment="mariadb-5.5.65-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827753" comment="mariadb-bench-5.5.65-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827754" comment="mariadb-devel-5.5.65-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827755" comment="mariadb-embedded-5.5.65-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827756" comment="mariadb-embedded-devel-5.5.65-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827757" comment="mariadb-libs-5.5.65-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827758" comment="mariadb-server-5.5.65-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827759" comment="mariadb-test-5.5.65-1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:904" version="1" class="patch">
	<metadata>
		<title>security update for bluez (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-10910" ref_url="https://www.suse.com/security/cve/CVE-2018-10910/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1101.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1101.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10910/">CVE-2018-10910 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10910">CVE-2018-10910 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827760" comment="bluez-5.44-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827761" comment="bluez-cups-5.44-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827762" comment="bluez-hid2hci-5.44-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827763" comment="bluez-libs-5.44-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827764" comment="bluez-libs-devel-5.44-6.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:905" version="1" class="patch">
	<metadata>
		<title>security update for php (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-10547" ref_url="https://www.suse.com/security/cve/CVE-2018-10547/" source="CVE"/>
		<reference ref_id="CVE-2018-5712" ref_url="https://www.suse.com/security/cve/CVE-2018-5712/" source="CVE"/>
		<reference ref_id="CVE-2018-7584" ref_url="https://www.suse.com/security/cve/CVE-2018-7584/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1112.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1112.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10547/">CVE-2018-10547 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10547">CVE-2018-10547 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5712/">CVE-2018-5712 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5712">CVE-2018-5712 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7584/">CVE-2018-7584 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7584">CVE-2018-7584 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9024">CVE-2019-9024 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827765" comment="php-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827766" comment="php-bcmath-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827767" comment="php-cli-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827768" comment="php-common-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827769" comment="php-dba-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827770" comment="php-devel-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827771" comment="php-embedded-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827772" comment="php-enchant-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827773" comment="php-fpm-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827774" comment="php-gd-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827775" comment="php-intl-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827776" comment="php-ldap-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827777" comment="php-mbstring-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827778" comment="php-mysql-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827779" comment="php-mysqlnd-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827780" comment="php-odbc-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827781" comment="php-pdo-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827782" comment="php-pgsql-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827783" comment="php-process-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827784" comment="php-pspell-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827785" comment="php-recode-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827786" comment="php-snmp-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827787" comment="php-soap-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827788" comment="php-xml-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827789" comment="php-xmlrpc-5.4.16-48.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827765" comment="php-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827766" comment="php-bcmath-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827767" comment="php-cli-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827768" comment="php-common-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827769" comment="php-dba-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827770" comment="php-devel-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827771" comment="php-embedded-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827772" comment="php-enchant-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827773" comment="php-fpm-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827774" comment="php-gd-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827775" comment="php-intl-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827776" comment="php-ldap-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827777" comment="php-mbstring-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827778" comment="php-mysql-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827779" comment="php-mysqlnd-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827780" comment="php-odbc-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827781" comment="php-pdo-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827782" comment="php-pgsql-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827783" comment="php-process-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827784" comment="php-pspell-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827785" comment="php-recode-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827786" comment="php-snmp-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827787" comment="php-soap-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827788" comment="php-xml-5.4.16-48.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827789" comment="php-xmlrpc-5.4.16-48.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:906" version="1" class="patch">
	<metadata>
		<title>security update for bash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-9924" ref_url="https://www.suse.com/security/cve/CVE-2019-9924/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1113.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1113.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9924/">CVE-2019-9924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9924">CVE-2019-9924 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827790" comment="bash-4.2.46-34.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827791" comment="bash-doc-4.2.46-34.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:907" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1116.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1116.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827792" comment="qemu-img-1.5.3-173.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827793" comment="qemu-kvm-1.5.3-173.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827794" comment="qemu-kvm-common-1.5.3-173.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827795" comment="qemu-kvm-tools-1.5.3-173.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:908" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-15710" ref_url="https://www.suse.com/security/cve/CVE-2017-15710/" source="CVE"/>
		<reference ref_id="CVE-2018-1301" ref_url="https://www.suse.com/security/cve/CVE-2018-1301/" source="CVE"/>
		<reference ref_id="CVE-2018-17199" ref_url="https://www.suse.com/security/cve/CVE-2018-17199/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1121.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1121.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15710/">CVE-2017-15710 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15710">CVE-2017-15710 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1301/">CVE-2018-1301 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1301">CVE-2018-1301 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17199/">CVE-2018-17199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17199">CVE-2018-17199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827796" comment="httpd-2.4.6-93.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827797" comment="httpd-devel-2.4.6-93.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827798" comment="httpd-manual-2.4.6-93.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827799" comment="httpd-tools-2.4.6-93.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827800" comment="mod_ldap-2.4.6-93.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827801" comment="mod_proxy_html-2.4.6-93.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827802" comment="mod_session-2.4.6-93.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827803" comment="mod_ssl-2.4.6-93.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:909" version="1" class="patch">
	<metadata>
		<title>security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1126.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1126.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14355">CVE-2018-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827804" comment="mutt-1.5.21-29.el7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827804" comment="mutt-1.5.21-29.el7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:910" version="1" class="patch">
	<metadata>
		<title>security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1131.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1131.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827805" comment="python-2.7.5-88.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827806" comment="python-debug-2.7.5-88.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827807" comment="python-devel-2.7.5-88.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827808" comment="python-libs-2.7.5-88.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827809" comment="python-test-2.7.5-88.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827810" comment="python-tools-2.7.5-88.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827811" comment="tkinter-2.7.5-88.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:911" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1132.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1132.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827812" comment="python3-3.6.8-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827813" comment="python3-debug-3.6.8-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827814" comment="python3-devel-3.6.8-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827815" comment="python3-idle-3.6.8-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827816" comment="python3-libs-3.6.8-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827817" comment="python3-test-3.6.8-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827818" comment="python3-tkinter-3.6.8-13.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:912" version="1" class="patch">
	<metadata>
		<title>security update for polkit (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1116" ref_url="https://www.suse.com/security/cve/CVE-2018-1116/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1135.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1135.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1116/">CVE-2018-1116 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1116">CVE-2018-1116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827819" comment="polkit-0.112-26.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827820" comment="polkit-devel-0.112-26.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827821" comment="polkit-docs-0.112-26.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:913" version="1" class="patch">
	<metadata>
		<title>security update for gettext (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18751" ref_url="https://www.suse.com/security/cve/CVE-2018-18751/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1138.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1138.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18751/">CVE-2018-18751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18751">CVE-2018-18751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827822" comment="emacs-gettext-0.19.8.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827823" comment="gettext-0.19.8.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827824" comment="gettext-common-devel-0.19.8.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827825" comment="gettext-devel-0.19.8.1-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827826" comment="gettext-libs-0.19.8.1-3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:914" version="1" class="patch">
	<metadata>
		<title>security update for nbdkit (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-14850" ref_url="https://www.suse.com/security/cve/CVE-2019-14850/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1167.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1167.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14850/">CVE-2019-14850 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14850">CVE-2019-14850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827827" comment="nbdkit-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827828" comment="nbdkit-basic-plugins-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827829" comment="nbdkit-devel-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827830" comment="nbdkit-example-plugins-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827831" comment="nbdkit-plugin-python-common-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827832" comment="nbdkit-plugin-python2-1.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827833" comment="nbdkit-plugin-vddk-1.8.0-3.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:915" version="1" class="patch">
	<metadata>
		<title>security update for qt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518/" source="CVE"/>
		<reference ref_id="CVE-2018-19869" ref_url="https://www.suse.com/security/cve/CVE-2018-19869/" source="CVE"/>
		<reference ref_id="CVE-2018-19870" ref_url="https://www.suse.com/security/cve/CVE-2018-19870/" source="CVE"/>
		<reference ref_id="CVE-2018-19871" ref_url="https://www.suse.com/security/cve/CVE-2018-19871/" source="CVE"/>
		<reference ref_id="CVE-2018-19872" ref_url="https://www.suse.com/security/cve/CVE-2018-19872/" source="CVE"/>
		<reference ref_id="CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1172.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1172.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15518">CVE-2018-15518 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19869/">CVE-2018-19869 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19869">CVE-2018-19869 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19870/">CVE-2018-19870 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19870">CVE-2018-19870 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19871/">CVE-2018-19871 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19871">CVE-2018-19871 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19872/">CVE-2018-19872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19872">CVE-2018-19872 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19873">CVE-2018-19873 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827834" comment="qt-4.8.7-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827835" comment="qt-assistant-4.8.7-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827836" comment="qt-config-4.8.7-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827837" comment="qt-demos-4.8.7-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827838" comment="qt-devel-4.8.7-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827839" comment="qt-devel-private-4.8.7-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827840" comment="qt-doc-4.8.7-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827841" comment="qt-examples-4.8.7-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827842" comment="qt-mysql-4.8.7-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827843" comment="qt-odbc-4.8.7-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827844" comment="qt-postgresql-4.8.7-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827845" comment="qt-qdbusviewer-4.8.7-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827846" comment="qt-qvfb-4.8.7-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827847" comment="qt-x11-4.8.7-8.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:916" version="1" class="patch">
	<metadata>
		<title>security update for okular (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-1000801" ref_url="https://www.suse.com/security/cve/CVE-2018-1000801/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1173.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1173.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000801/">CVE-2018-1000801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000801">CVE-2018-1000801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827848" comment="okular-4.10.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827849" comment="okular-devel-4.10.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827850" comment="okular-libs-4.10.5-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827851" comment="okular-part-4.10.5-8.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:917" version="1" class="patch">
	<metadata>
		<title>security update for taglib (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-11439" ref_url="https://www.suse.com/security/cve/CVE-2018-11439/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1175.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1175.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11439/">CVE-2018-11439 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11439">CVE-2018-11439 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827852" comment="taglib-1.8-8.20130218git.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827853" comment="taglib-devel-1.8-8.20130218git.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827854" comment="taglib-doc-1.8-8.20130218git.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827852" comment="taglib-1.8-8.20130218git.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827853" comment="taglib-devel-1.8-8.20130218git.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827854" comment="taglib-doc-1.8-8.20130218git.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:918" version="1" class="patch">
	<metadata>
		<title>security update for avahi (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-6519" ref_url="https://www.suse.com/security/cve/CVE-2017-6519/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1176.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1176.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6519/">CVE-2017-6519 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6519">CVE-2017-6519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827855" comment="avahi-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827856" comment="avahi-autoipd-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827857" comment="avahi-compat-howl-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827858" comment="avahi-compat-howl-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827859" comment="avahi-compat-libdns_sd-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827860" comment="avahi-compat-libdns_sd-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827861" comment="avahi-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827862" comment="avahi-dnsconfd-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827863" comment="avahi-glib-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827864" comment="avahi-glib-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827865" comment="avahi-gobject-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827866" comment="avahi-gobject-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827867" comment="avahi-libs-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827868" comment="avahi-qt3-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827869" comment="avahi-qt3-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827870" comment="avahi-qt4-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827871" comment="avahi-qt4-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827872" comment="avahi-tools-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827873" comment="avahi-ui-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827874" comment="avahi-ui-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827875" comment="avahi-ui-gtk3-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827876" comment="avahi-ui-tools-0.6.31-20.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827855" comment="avahi-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827856" comment="avahi-autoipd-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827857" comment="avahi-compat-howl-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827858" comment="avahi-compat-howl-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827859" comment="avahi-compat-libdns_sd-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827860" comment="avahi-compat-libdns_sd-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827861" comment="avahi-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827862" comment="avahi-dnsconfd-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827863" comment="avahi-glib-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827864" comment="avahi-glib-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827865" comment="avahi-gobject-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827866" comment="avahi-gobject-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827867" comment="avahi-libs-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827868" comment="avahi-qt3-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827869" comment="avahi-qt3-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827870" comment="avahi-qt4-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827871" comment="avahi-qt4-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827872" comment="avahi-tools-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827873" comment="avahi-ui-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827874" comment="avahi-ui-devel-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827875" comment="avahi-ui-gtk3-0.6.31-20.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827876" comment="avahi-ui-tools-0.6.31-20.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:919" version="1" class="patch">
	<metadata>
		<title>security update for zziplib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-17828" ref_url="https://www.suse.com/security/cve/CVE-2018-17828/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1178.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1178.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17828/">CVE-2018-17828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17828">CVE-2018-17828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827877" comment="zziplib-0.13.62-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827878" comment="zziplib-devel-0.13.62-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827879" comment="zziplib-utils-0.13.62-12.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827877" comment="zziplib-0.13.62-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827878" comment="zziplib-devel-0.13.62-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827879" comment="zziplib-utils-0.13.62-12.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:920" version="1" class="patch">
	<metadata>
		<title>security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476/" source="CVE"/>
		<reference ref_id="CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166/" source="CVE"/>
		<reference ref_id="CVE-2017-12805" ref_url="https://www.suse.com/security/cve/CVE-2017-12805/" source="CVE"/>
		<reference ref_id="CVE-2017-12806" ref_url="https://www.suse.com/security/cve/CVE-2017-12806/" source="CVE"/>
		<reference ref_id="CVE-2017-18251" ref_url="https://www.suse.com/security/cve/CVE-2017-18251/" source="CVE"/>
		<reference ref_id="CVE-2017-18252" ref_url="https://www.suse.com/security/cve/CVE-2017-18252/" source="CVE"/>
		<reference ref_id="CVE-2017-18254" ref_url="https://www.suse.com/security/cve/CVE-2017-18254/" source="CVE"/>
		<reference ref_id="CVE-2017-18271" ref_url="https://www.suse.com/security/cve/CVE-2017-18271/" source="CVE"/>
		<reference ref_id="CVE-2017-18273" ref_url="https://www.suse.com/security/cve/CVE-2017-18273/" source="CVE"/>
		<reference ref_id="CVE-2018-10177" ref_url="https://www.suse.com/security/cve/CVE-2018-10177/" source="CVE"/>
		<reference ref_id="CVE-2018-10804" ref_url="https://www.suse.com/security/cve/CVE-2018-10804/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-11656" ref_url="https://www.suse.com/security/cve/CVE-2018-11656/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-13153" ref_url="https://www.suse.com/security/cve/CVE-2018-13153/" source="CVE"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<reference ref_id="CVE-2018-15607" ref_url="https://www.suse.com/security/cve/CVE-2018-15607/" source="CVE"/>
		<reference ref_id="CVE-2018-16328" ref_url="https://www.suse.com/security/cve/CVE-2018-16328/" source="CVE"/>
		<reference ref_id="CVE-2018-16640" ref_url="https://www.suse.com/security/cve/CVE-2018-16640/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-16749" ref_url="https://www.suse.com/security/cve/CVE-2018-16749/" source="CVE"/>
		<reference ref_id="CVE-2018-16750" ref_url="https://www.suse.com/security/cve/CVE-2018-16750/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-17967" ref_url="https://www.suse.com/security/cve/CVE-2018-17967/" source="CVE"/>
		<reference ref_id="CVE-2018-18016" ref_url="https://www.suse.com/security/cve/CVE-2018-18016/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804/" source="CVE"/>
		<reference ref_id="CVE-2018-9133" ref_url="https://www.suse.com/security/cve/CVE-2018-9133/" source="CVE"/>
		<reference ref_id="CVE-2019-10131" ref_url="https://www.suse.com/security/cve/CVE-2019-10131/" source="CVE"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470/" source="CVE"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597/" source="CVE"/>
		<reference ref_id="CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598/" source="CVE"/>
		<reference ref_id="CVE-2019-12974" ref_url="https://www.suse.com/security/cve/CVE-2019-12974/" source="CVE"/>
		<reference ref_id="CVE-2019-12975" ref_url="https://www.suse.com/security/cve/CVE-2019-12975/" source="CVE"/>
		<reference ref_id="CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976/" source="CVE"/>
		<reference ref_id="CVE-2019-12978" ref_url="https://www.suse.com/security/cve/CVE-2019-12978/" source="CVE"/>
		<reference ref_id="CVE-2019-12979" ref_url="https://www.suse.com/security/cve/CVE-2019-12979/" source="CVE"/>
		<reference ref_id="CVE-2019-13133" ref_url="https://www.suse.com/security/cve/CVE-2019-13133/" source="CVE"/>
		<reference ref_id="CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134/" source="CVE"/>
		<reference ref_id="CVE-2019-13135" ref_url="https://www.suse.com/security/cve/CVE-2019-13135/" source="CVE"/>
		<reference ref_id="CVE-2019-13295" ref_url="https://www.suse.com/security/cve/CVE-2019-13295/" source="CVE"/>
		<reference ref_id="CVE-2019-13297" ref_url="https://www.suse.com/security/cve/CVE-2019-13297/" source="CVE"/>
		<reference ref_id="CVE-2019-13300" ref_url="https://www.suse.com/security/cve/CVE-2019-13300/" source="CVE"/>
		<reference ref_id="CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301/" source="CVE"/>
		<reference ref_id="CVE-2019-13304" ref_url="https://www.suse.com/security/cve/CVE-2019-13304/" source="CVE"/>
		<reference ref_id="CVE-2019-13305" ref_url="https://www.suse.com/security/cve/CVE-2019-13305/" source="CVE"/>
		<reference ref_id="CVE-2019-13306" ref_url="https://www.suse.com/security/cve/CVE-2019-13306/" source="CVE"/>
		<reference ref_id="CVE-2019-13307" ref_url="https://www.suse.com/security/cve/CVE-2019-13307/" source="CVE"/>
		<reference ref_id="CVE-2019-13309" ref_url="https://www.suse.com/security/cve/CVE-2019-13309/" source="CVE"/>
		<reference ref_id="CVE-2019-13310" ref_url="https://www.suse.com/security/cve/CVE-2019-13310/" source="CVE"/>
		<reference ref_id="CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311/" source="CVE"/>
		<reference ref_id="CVE-2019-13454" ref_url="https://www.suse.com/security/cve/CVE-2019-13454/" source="CVE"/>
		<reference ref_id="CVE-2019-14980" ref_url="https://www.suse.com/security/cve/CVE-2019-14980/" source="CVE"/>
		<reference ref_id="CVE-2019-14981" ref_url="https://www.suse.com/security/cve/CVE-2019-14981/" source="CVE"/>
		<reference ref_id="CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139/" source="CVE"/>
		<reference ref_id="CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140/" source="CVE"/>
		<reference ref_id="CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141/" source="CVE"/>
		<reference ref_id="CVE-2019-16708" ref_url="https://www.suse.com/security/cve/CVE-2019-16708/" source="CVE"/>
		<reference ref_id="CVE-2019-16709" ref_url="https://www.suse.com/security/cve/CVE-2019-16709/" source="CVE"/>
		<reference ref_id="CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710/" source="CVE"/>
		<reference ref_id="CVE-2019-16711" ref_url="https://www.suse.com/security/cve/CVE-2019-16711/" source="CVE"/>
		<reference ref_id="CVE-2019-16712" ref_url="https://www.suse.com/security/cve/CVE-2019-16712/" source="CVE"/>
		<reference ref_id="CVE-2019-16713" ref_url="https://www.suse.com/security/cve/CVE-2019-16713/" source="CVE"/>
		<reference ref_id="CVE-2019-17540" ref_url="https://www.suse.com/security/cve/CVE-2019-17540/" source="CVE"/>
		<reference ref_id="CVE-2019-17541" ref_url="https://www.suse.com/security/cve/CVE-2019-17541/" source="CVE"/>
		<reference ref_id="CVE-2019-19948" ref_url="https://www.suse.com/security/cve/CVE-2019-19948/" source="CVE"/>
		<reference ref_id="CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1180.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1180.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000476">CVE-2017-1000476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11166">CVE-2017-11166 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12805/">CVE-2017-12805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12805">CVE-2017-12805 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12806/">CVE-2017-12806 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12806">CVE-2017-12806 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18251/">CVE-2017-18251 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18251">CVE-2017-18251 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18252/">CVE-2017-18252 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18252">CVE-2017-18252 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18254/">CVE-2017-18254 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18254">CVE-2017-18254 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18271/">CVE-2017-18271 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18271">CVE-2017-18271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18273/">CVE-2017-18273 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18273">CVE-2017-18273 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10177/">CVE-2018-10177 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10177">CVE-2018-10177 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10804/">CVE-2018-10804 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10804">CVE-2018-10804 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10805">CVE-2018-10805 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11656/">CVE-2018-11656 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11656">CVE-2018-11656 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12599">CVE-2018-12599 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12600">CVE-2018-12600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-13153/">CVE-2018-13153 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13153">CVE-2018-13153 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14434">CVE-2018-14434 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14435">CVE-2018-14435 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14436">CVE-2018-14436 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14437">CVE-2018-14437 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15607/">CVE-2018-15607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15607">CVE-2018-15607 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16328/">CVE-2018-16328 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16328">CVE-2018-16328 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16640/">CVE-2018-16640 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16640">CVE-2018-16640 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16642">CVE-2018-16642 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16643">CVE-2018-16643 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16644">CVE-2018-16644 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16645">CVE-2018-16645 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16749/">CVE-2018-16749 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16749">CVE-2018-16749 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16750/">CVE-2018-16750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16750">CVE-2018-16750 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17966">CVE-2018-17966 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17967/">CVE-2018-17967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17967">CVE-2018-17967 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18016/">CVE-2018-18016 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18016">CVE-2018-18016 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18024">CVE-2018-18024 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18544">CVE-2018-18544 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20467">CVE-2018-20467 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8804">CVE-2018-8804 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-9133/">CVE-2018-9133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9133">CVE-2018-9133 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10131/">CVE-2019-10131 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10131">CVE-2019-10131 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10650">CVE-2019-10650 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11470">CVE-2019-11470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11472">CVE-2019-11472 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11597">CVE-2019-11597 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11598">CVE-2019-11598 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12974/">CVE-2019-12974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12974">CVE-2019-12974 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12975/">CVE-2019-12975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12975">CVE-2019-12975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12976">CVE-2019-12976 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12978/">CVE-2019-12978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12978">CVE-2019-12978 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12979/">CVE-2019-12979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12979">CVE-2019-12979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13133/">CVE-2019-13133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13133">CVE-2019-13133 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13134">CVE-2019-13134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13135/">CVE-2019-13135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13135">CVE-2019-13135 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13295/">CVE-2019-13295 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13295">CVE-2019-13295 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13297/">CVE-2019-13297 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13297">CVE-2019-13297 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13300/">CVE-2019-13300 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13300">CVE-2019-13300 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13301">CVE-2019-13301 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13304/">CVE-2019-13304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13304">CVE-2019-13304 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13305/">CVE-2019-13305 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13305">CVE-2019-13305 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13306/">CVE-2019-13306 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13306">CVE-2019-13306 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13307/">CVE-2019-13307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13307">CVE-2019-13307 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13309/">CVE-2019-13309 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13309">CVE-2019-13309 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13310/">CVE-2019-13310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13310">CVE-2019-13310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13311">CVE-2019-13311 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13454/">CVE-2019-13454 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13454">CVE-2019-13454 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14980/">CVE-2019-14980 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14980">CVE-2019-14980 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14981/">CVE-2019-14981 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14981">CVE-2019-14981 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15139">CVE-2019-15139 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15140">CVE-2019-15140 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15141">CVE-2019-15141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16708/">CVE-2019-16708 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16708">CVE-2019-16708 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16709/">CVE-2019-16709 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16709">CVE-2019-16709 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16710">CVE-2019-16710 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16711/">CVE-2019-16711 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16711">CVE-2019-16711 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16712/">CVE-2019-16712 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16712">CVE-2019-16712 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16713/">CVE-2019-16713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16713">CVE-2019-16713 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17540/">CVE-2019-17540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17540">CVE-2019-17540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17541/">CVE-2019-17541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17541">CVE-2019-17541 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19948/">CVE-2019-19948 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19948">CVE-2019-19948 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19949">CVE-2019-19949 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7175">CVE-2019-7175 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7397">CVE-2019-7397 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7398">CVE-2019-7398 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9956">CVE-2019-9956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827880" comment="ImageMagick-6.9.10.68-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827881" comment="ImageMagick-c++-6.9.10.68-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827882" comment="ImageMagick-c++-devel-6.9.10.68-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827883" comment="ImageMagick-devel-6.9.10.68-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827884" comment="ImageMagick-doc-6.9.10.68-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827885" comment="ImageMagick-perl-6.9.10.68-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827886" comment="autotrace-0.31.1-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827887" comment="autotrace-devel-0.31.1-38.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827888" comment="emacs-24.3-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827889" comment="emacs-common-24.3-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827890" comment="emacs-el-24.3-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827891" comment="emacs-filesystem-24.3-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827892" comment="emacs-nox-24.3-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827893" comment="emacs-terminal-24.3-23.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827894" comment="inkscape-0.92.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827895" comment="inkscape-docs-0.92.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827896" comment="inkscape-view-0.92.2-3.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:921" version="1" class="patch">
	<metadata>
		<title>security update for unzip (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-13232" ref_url="https://www.suse.com/security/cve/CVE-2019-13232/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1181.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1181.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13232/">CVE-2019-13232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13232">CVE-2019-13232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827897" comment="unzip-6.0-21.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:922" version="1" class="patch">
	<metadata>
		<title>security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1185.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1185.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13139">CVE-2018-13139 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827898" comment="libsndfile-1.0.25-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827899" comment="libsndfile-devel-1.0.25-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827900" comment="libsndfile-utils-1.0.25-11.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:923" version="1" class="patch">
	<metadata>
		<title>security update for libqb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-12779" ref_url="https://www.suse.com/security/cve/CVE-2019-12779/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1189.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1189.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12779/">CVE-2019-12779 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12779">CVE-2019-12779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827901" comment="libqb-1.0.1-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827902" comment="libqb-devel-1.0.1-9.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827901" comment="libqb-1.0.1-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827902" comment="libqb-devel-1.0.1-9.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:924" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131/" source="CVE"/>
		<reference ref_id="CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412/" source="CVE"/>
		<reference ref_id="CVE-2017-18258" ref_url="https://www.suse.com/security/cve/CVE-2017-18258/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-14567" ref_url="https://www.suse.com/security/cve/CVE-2018-14567/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1190.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1190.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8035">CVE-2015-8035 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5131">CVE-2016-5131 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15412">CVE-2017-15412 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18258/">CVE-2017-18258 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18258">CVE-2017-18258 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14567/">CVE-2018-14567 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14567">CVE-2018-14567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827903" comment="libxml2-2.9.1-6.el7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827904" comment="libxml2-devel-2.9.1-6.el7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827905" comment="libxml2-python-2.9.1-6.el7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827906" comment="libxml2-static-2.9.1-6.el7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:925" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1208.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1208.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827907" comment="qemu-img-1.5.3-173.el7_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827908" comment="qemu-kvm-1.5.3-173.el7_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827909" comment="qemu-kvm-common-1.5.3-173.el7_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827910" comment="qemu-kvm-tools-1.5.3-173.el7_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:926" version="1" class="patch">
	<metadata>
		<title>security update for telnet (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-10188" ref_url="https://www.suse.com/security/cve/CVE-2020-10188/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1334.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1334.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10188/">CVE-2020-10188 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10188">CVE-2020-10188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827911" comment="telnet-0.17-65.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827912" comment="telnet-server-0.17-65.el7_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:927" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1338.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1338.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827913" comment="firefox-68.6.1-1.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:928" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1420.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1420.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827914" comment="firefox-68.7.0-2.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:929" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1489.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1489.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6819">CVE-2020-6819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6820">CVE-2020-6820 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6821">CVE-2020-6821 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6822">CVE-2020-6822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6825">CVE-2020-6825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827915" comment="thunderbird-68.7.0-1.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:930" version="1" class="patch">
	<metadata>
		<title>security update for java-1.7.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1507.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1507.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827916" comment="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827917" comment="java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827918" comment="java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827919" comment="java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827920" comment="java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827921" comment="java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827922" comment="java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:931" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2767" ref_url="https://www.suse.com/security/cve/CVE-2020-2767/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2778" ref_url="https://www.suse.com/security/cve/CVE-2020-2778/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2816" ref_url="https://www.suse.com/security/cve/CVE-2020-2816/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1509.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1509.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2767/">CVE-2020-2767 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2767">CVE-2020-2767 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2778/">CVE-2020-2778 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2778">CVE-2020-2778 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-2816/">CVE-2020-2816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2816">CVE-2020-2816 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827923" comment="java-11-openjdk-11.0.7.10-4.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827924" comment="java-11-openjdk-demo-11.0.7.10-4.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827925" comment="java-11-openjdk-devel-11.0.7.10-4.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827926" comment="java-11-openjdk-headless-11.0.7.10-4.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827927" comment="java-11-openjdk-javadoc-11.0.7.10-4.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827928" comment="java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827929" comment="java-11-openjdk-jmods-11.0.7.10-4.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827930" comment="java-11-openjdk-src-11.0.7.10-4.el7_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:932" version="1" class="patch">
	<metadata>
		<title>security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1511.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1511.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5260">CVE-2020-5260 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827931" comment="emacs-git-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827932" comment="emacs-git-el-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827933" comment="git-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827934" comment="git-all-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827935" comment="git-bzr-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827936" comment="git-cvs-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827937" comment="git-daemon-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827938" comment="git-email-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827939" comment="git-gnome-keyring-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827940" comment="git-gui-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827941" comment="git-hg-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827942" comment="git-instaweb-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827943" comment="git-p4-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827944" comment="git-svn-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827945" comment="gitk-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827946" comment="gitweb-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827947" comment="perl-Git-1.8.3.1-22.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827948" comment="perl-Git-SVN-1.8.3.1-22.el7_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:933" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1512.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1512.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2754">CVE-2020-2754 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2830">CVE-2020-2830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827949" comment="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827950" comment="java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827951" comment="java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827952" comment="java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827953" comment="java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827954" comment="java-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827955" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.252.b09-2.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827956" comment="java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:934" version="1" class="patch">
	<metadata>
		<title>security update for python-twisted-web (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-10108" ref_url="https://www.suse.com/security/cve/CVE-2020-10108/" source="CVE"/>
		<reference ref_id="CVE-2020-10109" ref_url="https://www.suse.com/security/cve/CVE-2020-10109/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:1561.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:1561.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10108/">CVE-2020-10108 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10108">CVE-2020-10108 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10109/">CVE-2020-10109 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10109">CVE-2020-10109 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827957" comment="python-twisted-web-12.1.0-7.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:935" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2037.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2037.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827958" comment="firefox-68.8.0-1.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:936" version="1" class="patch">
	<metadata>
		<title>security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2040.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2040.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12519">CVE-2019-12519 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12525">CVE-2019-12525 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11945">CVE-2020-11945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827959" comment="squid-3.5.20-15.el7_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827960" comment="squid-migration-script-3.5.20-15.el7_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827961" comment="squid-sysvinit-3.5.20-15.el7_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:937" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-12397" ref_url="https://www.suse.com/security/cve/CVE-2020-12397/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2050.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2050.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12387">CVE-2020-12387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12392">CVE-2020-12392 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12395">CVE-2020-12395 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12397/">CVE-2020-12397 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12397">CVE-2020-12397 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6831">CVE-2020-6831 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827962" comment="thunderbird-68.8.0-1.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:938" version="1" class="patch">
	<metadata>
		<title>security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2068.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2068.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827963" comment="python3-pip-9.0.3-7.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:939" version="1" class="patch">
	<metadata>
		<title>security update for python-virtualenv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<reference ref_id="CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2081.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2081.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20060">CVE-2018-20060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827964" comment="python-virtualenv-15.1.0-4.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:940" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2082.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2082.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18595">CVE-2017-18595 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19768">CVE-2019-19768 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10711">CVE-2020-10711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827965" comment="bpftool-3.10.0-1127.8.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827966" comment="kernel-3.10.0-1127.8.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827967" comment="kernel-abi-whitelists-3.10.0-1127.8.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827968" comment="kernel-debug-3.10.0-1127.8.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827971" comment="kernel-doc-3.10.0-1127.8.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827972" comment="kernel-headers-3.10.0-1127.8.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827973" comment="kernel-tools-3.10.0-1127.8.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827974" comment="kernel-tools-libs-3.10.0-1127.8.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827976" comment="perf-3.10.0-1127.8.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827977" comment="python-perf-3.10.0-1127.8.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:941" version="1" class="patch">
	<metadata>
		<title>security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2337.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2337.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11008">CVE-2020-11008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827978" comment="emacs-git-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827979" comment="emacs-git-el-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827980" comment="git-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827981" comment="git-all-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827982" comment="git-bzr-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827983" comment="git-cvs-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827984" comment="git-daemon-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827985" comment="git-email-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827986" comment="git-gnome-keyring-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827987" comment="git-gui-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827988" comment="git-hg-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827989" comment="git-instaweb-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827990" comment="git-p4-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827991" comment="git-svn-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827992" comment="gitk-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827993" comment="gitweb-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827994" comment="perl-Git-1.8.3.1-23.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827995" comment="perl-Git-SVN-1.8.3.1-23.el7_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:942" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2344.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2344.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8616">CVE-2020-8616 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8617">CVE-2020-8617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009827996" comment="bind-9.11.4-16.P2.el7_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827997" comment="bind-chroot-9.11.4-16.P2.el7_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827998" comment="bind-devel-9.11.4-16.P2.el7_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009827999" comment="bind-export-devel-9.11.4-16.P2.el7_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828000" comment="bind-export-libs-9.11.4-16.P2.el7_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828001" comment="bind-libs-9.11.4-16.P2.el7_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828002" comment="bind-libs-lite-9.11.4-16.P2.el7_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828003" comment="bind-license-9.11.4-16.P2.el7_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828004" comment="bind-lite-devel-9.11.4-16.P2.el7_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828005" comment="bind-pkcs11-9.11.4-16.P2.el7_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828006" comment="bind-pkcs11-devel-9.11.4-16.P2.el7_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828007" comment="bind-pkcs11-libs-9.11.4-16.P2.el7_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828008" comment="bind-pkcs11-utils-9.11.4-16.P2.el7_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828009" comment="bind-sdb-9.11.4-16.P2.el7_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828010" comment="bind-sdb-chroot-9.11.4-16.P2.el7_8.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828011" comment="bind-utils-9.11.4-16.P2.el7_8.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:943" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2381.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2381.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828012" comment="firefox-68.9.0-1.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:944" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-13398" ref_url="https://www.suse.com/security/cve/CVE-2020-13398/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2405.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2405.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13398/">CVE-2020-13398 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13398">CVE-2020-13398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828013" comment="freerdp-2.0.0-4.rc4.el7_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828014" comment="freerdp-devel-2.0.0-4.rc4.el7_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828015" comment="freerdp-libs-2.0.0-4.rc4.el7_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828016" comment="libwinpr-2.0.0-4.rc4.el7_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828017" comment="libwinpr-devel-2.0.0-4.rc4.el7_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:945" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-12662" ref_url="https://www.suse.com/security/cve/CVE-2020-12662/" source="CVE"/>
		<reference ref_id="CVE-2020-12663" ref_url="https://www.suse.com/security/cve/CVE-2020-12663/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2414.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2414.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12662/">CVE-2020-12662 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12662">CVE-2020-12662 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12663/">CVE-2020-12663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12663">CVE-2020-12663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828018" comment="unbound-1.6.6-4.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828019" comment="unbound-libs-1.6.6-4.el7_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:946" version="1" class="patch">
	<metadata>
		<title>security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2432.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2432.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828020" comment="microcode_ctl-2.1-61.6.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:947" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2530.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2530.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9484">CVE-2020-9484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828021" comment="tomcat-7.0.76-12.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828022" comment="tomcat-admin-webapps-7.0.76-12.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828023" comment="tomcat-docs-webapp-7.0.76-12.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828024" comment="tomcat-el-2.2-api-7.0.76-12.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828025" comment="tomcat-javadoc-7.0.76-12.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828026" comment="tomcat-jsp-2.2-api-7.0.76-12.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828027" comment="tomcat-jsvc-7.0.76-12.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828028" comment="tomcat-lib-7.0.76-12.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828029" comment="tomcat-servlet-3.0-api-7.0.76-12.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828030" comment="tomcat-webapps-7.0.76-12.el7_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:948" version="1" class="patch">
	<metadata>
		<title>security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2549.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2549.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13112">CVE-2020-13112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828031" comment="libexif-0.6.21-7.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828032" comment="libexif-devel-0.6.21-7.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828033" comment="libexif-doc-0.6.21-7.el7_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:949" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-12398" ref_url="https://www.suse.com/security/cve/CVE-2020-12398/" source="CVE"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2615.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2615.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12398/">CVE-2020-12398 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12398">CVE-2020-12398 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12405">CVE-2020-12405 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12406">CVE-2020-12406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12410">CVE-2020-12410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828034" comment="thunderbird-68.9.0-1.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:950" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-10772" ref_url="https://www.suse.com/security/cve/CVE-2020-10772/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2642.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2642.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10772/">CVE-2020-10772 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10772">CVE-2020-10772 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828035" comment="unbound-1.6.6-5.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828036" comment="unbound-devel-1.6.6-5.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828037" comment="unbound-libs-1.6.6-5.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828038" comment="unbound-python-1.6.6-5.el7_8 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828035" comment="unbound-1.6.6-5.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828036" comment="unbound-devel-1.6.6-5.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828037" comment="unbound-libs-1.6.6-5.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828038" comment="unbound-python-1.6.6-5.el7_8 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:951" version="1" class="patch">
	<metadata>
		<title>security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2663.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2663.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11868">CVE-2020-11868 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13817">CVE-2020-13817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828039" comment="ntp-4.2.6p5-29.el7_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828040" comment="ntp-doc-4.2.6p5-29.el7_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828041" comment="ntp-perl-4.2.6p5-29.el7_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828042" comment="ntpdate-4.2.6p5-29.el7_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828043" comment="sntp-4.2.6p5-29.el7_8.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828039" comment="ntp-4.2.6p5-29.el7_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828040" comment="ntp-doc-4.2.6p5-29.el7_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828041" comment="ntp-perl-4.2.6p5-29.el7_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828042" comment="ntpdate-4.2.6p5-29.el7_8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828043" comment="sntp-4.2.6p5-29.el7_8.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:952" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2664.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2664.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12888">CVE-2020-12888 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828044" comment="bpftool-3.10.0-1127.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828045" comment="kernel-3.10.0-1127.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828046" comment="kernel-abi-whitelists-3.10.0-1127.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828047" comment="kernel-debug-3.10.0-1127.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828050" comment="kernel-doc-3.10.0-1127.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828051" comment="kernel-headers-3.10.0-1127.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828052" comment="kernel-tools-3.10.0-1127.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828053" comment="kernel-tools-libs-3.10.0-1127.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828055" comment="perf-3.10.0-1127.13.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828056" comment="python-perf-3.10.0-1127.13.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:953" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2827.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2827.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828057" comment="firefox-68.10.0-1.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:954" version="1" class="patch">
	<metadata>
		<title>security update for dbus (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2894.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2894.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12049">CVE-2020-12049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828058" comment="dbus-1.10.24-14.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828059" comment="dbus-devel-1.10.24-14.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828060" comment="dbus-doc-1.10.24-14.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828061" comment="dbus-libs-1.10.24-14.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828062" comment="dbus-tests-1.10.24-14.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828063" comment="dbus-x11-1.10.24-14.el7_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:955" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2906.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2906.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12417">CVE-2020-12417 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12418">CVE-2020-12418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12419">CVE-2020-12419 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12420">CVE-2020-12420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12421">CVE-2020-12421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828064" comment="thunderbird-68.10.0-1.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:956" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2968.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2968.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828065" comment="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828066" comment="java-1.8.0-openjdk-accessibility-1.8.0.262.b10-0.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828067" comment="java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828068" comment="java-1.8.0-openjdk-devel-1.8.0.262.b10-0.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828069" comment="java-1.8.0-openjdk-headless-1.8.0.262.b10-0.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828070" comment="java-1.8.0-openjdk-javadoc-1.8.0.262.b10-0.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828071" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.262.b10-0.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828072" comment="java-1.8.0-openjdk-src-1.8.0.262.b10-0.el7_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:957" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14562" ref_url="https://www.suse.com/security/cve/CVE-2020-14562/" source="CVE"/>
		<reference ref_id="CVE-2020-14573" ref_url="https://www.suse.com/security/cve/CVE-2020-14573/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:2969.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:2969.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14562/">CVE-2020-14562 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14562">CVE-2020-14562 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14573/">CVE-2020-14573 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14573">CVE-2020-14573 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828073" comment="java-11-openjdk-11.0.8.10-0.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828074" comment="java-11-openjdk-demo-11.0.8.10-0.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828075" comment="java-11-openjdk-devel-11.0.8.10-0.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828076" comment="java-11-openjdk-headless-11.0.8.10-0.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828077" comment="java-11-openjdk-javadoc-11.0.8.10-0.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828078" comment="java-11-openjdk-javadoc-zip-11.0.8.10-0.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828079" comment="java-11-openjdk-jmods-11.0.8.10-0.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828080" comment="java-11-openjdk-src-11.0.8.10-0.el7_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:958" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3220.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3220.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19527">CVE-2019-19527 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828081" comment="bpftool-3.10.0-1127.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828082" comment="kernel-3.10.0-1127.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828083" comment="kernel-abi-whitelists-3.10.0-1127.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828084" comment="kernel-debug-3.10.0-1127.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828087" comment="kernel-doc-3.10.0-1127.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828088" comment="kernel-headers-3.10.0-1127.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828089" comment="kernel-tools-3.10.0-1127.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828090" comment="kernel-tools-libs-3.10.0-1127.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828092" comment="perf-3.10.0-1127.18.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828093" comment="python-perf-3.10.0-1127.18.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:959" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3253.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3253.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828094" comment="firefox-68.11.0-1.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:960" version="1" class="patch">
	<metadata>
		<title>security update for libvncserver (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3281.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3281.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18922">CVE-2017-18922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828095" comment="libvncserver-0.9.9-14.el7_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828096" comment="libvncserver-devel-0.9.9-14.el7_8.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828095" comment="libvncserver-0.9.9-14.el7_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828096" comment="libvncserver-devel-0.9.9-14.el7_8.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:961" version="1" class="patch">
	<metadata>
		<title>security update for postgresql-jdbc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-13692" ref_url="https://www.suse.com/security/cve/CVE-2020-13692/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3285.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3285.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13692/">CVE-2020-13692 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13692">CVE-2020-13692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828097" comment="postgresql-jdbc-9.2.1002-8.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828098" comment="postgresql-jdbc-javadoc-9.2.1002-8.el7_8 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828097" comment="postgresql-jdbc-9.2.1002-8.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828098" comment="postgresql-jdbc-javadoc-9.2.1002-8.el7_8 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:962" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3344.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3344.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15652">CVE-2020-15652 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15659">CVE-2020-15659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6463">CVE-2020-6463 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6514">CVE-2020-6514 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828099" comment="thunderbird-68.11.0-1.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:963" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15669" ref_url="https://www.suse.com/security/cve/CVE-2020-15669/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3556.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3556.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15669/">CVE-2020-15669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15669">CVE-2020-15669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828100" comment="firefox-68.12.0-1.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:964" version="1" class="patch">
	<metadata>
		<title>security update for dovecot (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-12100" ref_url="https://www.suse.com/security/cve/CVE-2020-12100/" source="CVE"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3617.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3617.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12100/">CVE-2020-12100 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12100">CVE-2020-12100 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12673">CVE-2020-12673 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12674">CVE-2020-12674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828101" comment="dovecot-2.2.36-6.el7_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828102" comment="dovecot-devel-2.2.36-6.el7_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828103" comment="dovecot-mysql-2.2.36-6.el7_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828104" comment="dovecot-pgsql-2.2.36-6.el7_8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828105" comment="dovecot-pigeonhole-2.2.36-6.el7_8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:965" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15669" ref_url="https://www.suse.com/security/cve/CVE-2020-15669/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3631.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3631.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15664">CVE-2020-15664 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15669/">CVE-2020-15669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15669">CVE-2020-15669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828106" comment="thunderbird-68.12.0-1.el7_8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:966" version="1" class="patch">
	<metadata>
		<title>security update for libmspack (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-1010305" ref_url="https://www.suse.com/security/cve/CVE-2019-1010305/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3848.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3848.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010305/">CVE-2019-1010305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010305">CVE-2019-1010305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828107" comment="libmspack-0.5-0.8.alpha.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828108" comment="libmspack-devel-0.5-0.8.alpha.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828107" comment="libmspack-0.5-0.8.alpha.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828108" comment="libmspack-devel-0.5-0.8.alpha.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:967" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-19126" ref_url="https://www.suse.com/security/cve/CVE-2019-19126/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3861.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3861.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19126/">CVE-2019-19126 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">CVE-2019-19126 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828109" comment="glibc-2.17-317.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828110" comment="glibc-common-2.17-317.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828111" comment="glibc-devel-2.17-317.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828112" comment="glibc-headers-2.17-317.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828113" comment="glibc-static-2.17-317.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828114" comment="glibc-utils-2.17-317.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828115" comment="nscd-2.17-317.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:968" version="1" class="patch">
	<metadata>
		<title>security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-18190" ref_url="https://www.suse.com/security/cve/CVE-2017-18190/" source="CVE"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3864.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3864.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18190/">CVE-2017-18190 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18190">CVE-2017-18190 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8675">CVE-2019-8675 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8696">CVE-2019-8696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828116" comment="cups-1.6.3-51.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828117" comment="cups-client-1.6.3-51.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828118" comment="cups-devel-1.6.3-51.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828119" comment="cups-filesystem-1.6.3-51.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828120" comment="cups-ipptool-1.6.3-51.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828121" comment="cups-libs-1.6.3-51.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828122" comment="cups-lpd-1.6.3-51.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:969" version="1" class="patch">
	<metadata>
		<title>security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3868.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3868.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7572">CVE-2019-7572 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7573">CVE-2019-7573 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7574">CVE-2019-7574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7575">CVE-2019-7575 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7576">CVE-2019-7576 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7577">CVE-2019-7577 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7578">CVE-2019-7578 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7635">CVE-2019-7635 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7636">CVE-2019-7636 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7637">CVE-2019-7637 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7638">CVE-2019-7638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828123" comment="SDL-1.2.15-17.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828124" comment="SDL-devel-1.2.15-17.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828125" comment="SDL-static-1.2.15-17.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828123" comment="SDL-1.2.15-17.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828124" comment="SDL-devel-1.2.15-17.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828125" comment="SDL-static-1.2.15-17.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:970" version="1" class="patch">
	<metadata>
		<title>security update for pcp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-3695" ref_url="https://www.suse.com/security/cve/CVE-2019-3695/" source="CVE"/>
		<reference ref_id="CVE-2019-3696" ref_url="https://www.suse.com/security/cve/CVE-2019-3696/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3869.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3869.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3695/">CVE-2019-3695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3695">CVE-2019-3695 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3696/">CVE-2019-3696 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3696">CVE-2019-3696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828126" comment="pcp-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828127" comment="pcp-conf-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828128" comment="pcp-devel-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828129" comment="pcp-doc-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828130" comment="pcp-export-pcp2elasticsearch-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828131" comment="pcp-export-pcp2graphite-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828132" comment="pcp-export-pcp2influxdb-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828133" comment="pcp-export-pcp2json-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828134" comment="pcp-export-pcp2spark-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828135" comment="pcp-export-pcp2xml-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828136" comment="pcp-export-pcp2zabbix-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828137" comment="pcp-export-zabbix-agent-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828138" comment="pcp-gui-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828139" comment="pcp-import-collectl2pcp-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828140" comment="pcp-import-ganglia2pcp-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828141" comment="pcp-import-iostat2pcp-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828142" comment="pcp-import-mrtg2pcp-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828143" comment="pcp-import-sar2pcp-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828144" comment="pcp-libs-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828145" comment="pcp-libs-devel-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828146" comment="pcp-manager-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828147" comment="pcp-pmda-activemq-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828148" comment="pcp-pmda-apache-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828149" comment="pcp-pmda-bash-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828150" comment="pcp-pmda-bcc-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828151" comment="pcp-pmda-bind2-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828152" comment="pcp-pmda-bonding-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828153" comment="pcp-pmda-cifs-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828154" comment="pcp-pmda-cisco-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828155" comment="pcp-pmda-dbping-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828156" comment="pcp-pmda-dm-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828157" comment="pcp-pmda-docker-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828158" comment="pcp-pmda-ds389-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828159" comment="pcp-pmda-ds389log-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828160" comment="pcp-pmda-elasticsearch-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828161" comment="pcp-pmda-gfs2-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828162" comment="pcp-pmda-gluster-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828163" comment="pcp-pmda-gpfs-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828164" comment="pcp-pmda-gpsd-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828165" comment="pcp-pmda-haproxy-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828166" comment="pcp-pmda-infiniband-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828167" comment="pcp-pmda-json-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828168" comment="pcp-pmda-libvirt-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828169" comment="pcp-pmda-lio-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828170" comment="pcp-pmda-lmsensors-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828171" comment="pcp-pmda-logger-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828172" comment="pcp-pmda-lustre-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828173" comment="pcp-pmda-lustrecomm-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828174" comment="pcp-pmda-mailq-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828175" comment="pcp-pmda-memcache-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828176" comment="pcp-pmda-mic-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828177" comment="pcp-pmda-mounts-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828178" comment="pcp-pmda-mysql-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828179" comment="pcp-pmda-named-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828180" comment="pcp-pmda-netfilter-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828181" comment="pcp-pmda-news-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828182" comment="pcp-pmda-nfsclient-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828183" comment="pcp-pmda-nginx-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828184" comment="pcp-pmda-nvidia-gpu-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828185" comment="pcp-pmda-oracle-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828186" comment="pcp-pmda-pdns-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828187" comment="pcp-pmda-perfevent-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828188" comment="pcp-pmda-postfix-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828189" comment="pcp-pmda-postgresql-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828190" comment="pcp-pmda-prometheus-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828191" comment="pcp-pmda-redis-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828192" comment="pcp-pmda-roomtemp-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828193" comment="pcp-pmda-rpm-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828194" comment="pcp-pmda-rsyslog-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828195" comment="pcp-pmda-samba-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828196" comment="pcp-pmda-sendmail-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828197" comment="pcp-pmda-shping-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828198" comment="pcp-pmda-slurm-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828199" comment="pcp-pmda-smart-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828200" comment="pcp-pmda-snmp-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828201" comment="pcp-pmda-summary-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828202" comment="pcp-pmda-systemd-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828203" comment="pcp-pmda-trace-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828204" comment="pcp-pmda-unbound-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828205" comment="pcp-pmda-vmware-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828206" comment="pcp-pmda-weblog-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828207" comment="pcp-pmda-zimbra-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828208" comment="pcp-pmda-zswap-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828209" comment="pcp-selinux-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828210" comment="pcp-system-tools-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828211" comment="pcp-testsuite-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828212" comment="pcp-webapi-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828213" comment="pcp-webapp-blinkenlights-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828214" comment="pcp-webapp-grafana-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828215" comment="pcp-webapp-graphite-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828216" comment="pcp-webapp-vector-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828217" comment="pcp-webjs-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828218" comment="pcp-zeroconf-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828219" comment="perl-PCP-LogImport-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828220" comment="perl-PCP-LogSummary-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828221" comment="perl-PCP-MMV-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828222" comment="perl-PCP-PMDA-4.3.2-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828223" comment="python-pcp-4.3.2-12.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:971" version="1" class="patch">
	<metadata>
		<title>security update for libsrtp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2013-2139" ref_url="https://www.suse.com/security/cve/CVE-2013-2139/" source="CVE"/>
		<reference ref_id="CVE-2015-6360" ref_url="https://www.suse.com/security/cve/CVE-2015-6360/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3873.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3873.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2139/">CVE-2013-2139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2139">CVE-2013-2139 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6360/">CVE-2015-6360 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6360">CVE-2015-6360 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828224" comment="libsrtp-1.4.4-11.20101004cvs.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828225" comment="libsrtp-devel-1.4.4-11.20101004cvs.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828224" comment="libsrtp-1.4.4-11.20101004cvs.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828225" comment="libsrtp-devel-1.4.4-11.20101004cvs.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:972" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3875.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3875.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15691">CVE-2019-15691 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15692">CVE-2019-15692 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15693">CVE-2019-15693 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15694">CVE-2019-15694 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15695">CVE-2019-15695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828226" comment="tigervnc-1.8.0-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828227" comment="tigervnc-icons-1.8.0-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828228" comment="tigervnc-license-1.8.0-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828229" comment="tigervnc-server-1.8.0-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828230" comment="tigervnc-server-applet-1.8.0-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828231" comment="tigervnc-server-minimal-1.8.0-21.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828232" comment="tigervnc-server-module-1.8.0-21.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:973" version="1" class="patch">
	<metadata>
		<title>security update for libvpx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-0393" ref_url="https://www.suse.com/security/cve/CVE-2017-0393/" source="CVE"/>
		<reference ref_id="CVE-2019-9232" ref_url="https://www.suse.com/security/cve/CVE-2019-9232/" source="CVE"/>
		<reference ref_id="CVE-2019-9433" ref_url="https://www.suse.com/security/cve/CVE-2019-9433/" source="CVE"/>
		<reference ref_id="CVE-2020-0034" ref_url="https://www.suse.com/security/cve/CVE-2020-0034/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3876.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3876.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-0393/">CVE-2017-0393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0393">CVE-2017-0393 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9232/">CVE-2019-9232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9232">CVE-2019-9232 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9433/">CVE-2019-9433 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9433">CVE-2019-9433 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0034/">CVE-2020-0034 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0034">CVE-2020-0034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828233" comment="libvpx-1.3.0-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828234" comment="libvpx-devel-1.3.0-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828235" comment="libvpx-utils-1.3.0-8.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828233" comment="libvpx-1.3.0-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828234" comment="libvpx-devel-1.3.0-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828235" comment="libvpx-utils-1.3.0-8.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:974" version="1" class="patch">
	<metadata>
		<title>security update for audiofile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-13440" ref_url="https://www.suse.com/security/cve/CVE-2018-13440/" source="CVE"/>
		<reference ref_id="CVE-2018-17095" ref_url="https://www.suse.com/security/cve/CVE-2018-17095/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3877.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3877.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13440/">CVE-2018-13440 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13440">CVE-2018-13440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17095/">CVE-2018-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17095">CVE-2018-17095 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828236" comment="audiofile-0.3.6-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828237" comment="audiofile-devel-0.3.6-9.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828236" comment="audiofile-0.3.6-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828237" comment="audiofile-devel-0.3.6-9.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:975" version="1" class="patch">
	<metadata>
		<title>security update for dnsmasq (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3878.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3878.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14834">CVE-2019-14834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828238" comment="dnsmasq-2.76-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828239" comment="dnsmasq-utils-2.76-16.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:976" version="1" class="patch">
	<metadata>
		<title>security update for python-pillow (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-5313" ref_url="https://www.suse.com/security/cve/CVE-2020-5313/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3887.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3887.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5313/">CVE-2020-5313 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5313">CVE-2020-5313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828240" comment="python-pillow-2.0.0-21.gitd1c6db8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828241" comment="python-pillow-devel-2.0.0-21.gitd1c6db8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828242" comment="python-pillow-doc-2.0.0-21.gitd1c6db8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828243" comment="python-pillow-qt-2.0.0-21.gitd1c6db8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828244" comment="python-pillow-sane-2.0.0-21.gitd1c6db8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828245" comment="python-pillow-tk-2.0.0-21.gitd1c6db8.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:977" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3888.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3888.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828246" comment="python3-3.6.8-17.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828247" comment="python3-debug-3.6.8-17.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828248" comment="python3-devel-3.6.8-17.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828249" comment="python3-idle-3.6.8-17.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828250" comment="python3-libs-3.6.8-17.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828251" comment="python3-test-3.6.8-17.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828252" comment="python3-tkinter-3.6.8-17.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:978" version="1" class="patch">
	<metadata>
		<title>security update for cloud-init (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-10896" ref_url="https://www.suse.com/security/cve/CVE-2018-10896/" source="CVE"/>
		<reference ref_id="CVE-2020-8631" ref_url="https://www.suse.com/security/cve/CVE-2020-8631/" source="CVE"/>
		<reference ref_id="CVE-2020-8632" ref_url="https://www.suse.com/security/cve/CVE-2020-8632/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3898.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3898.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10896/">CVE-2018-10896 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10896">CVE-2018-10896 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8631/">CVE-2020-8631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8631">CVE-2020-8631 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8632/">CVE-2020-8632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8632">CVE-2020-8632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828253" comment="cloud-init-19.4-7.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:979" version="1" class="patch">
	<metadata>
		<title>security update for libpng (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3901.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3901.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12652">CVE-2017-12652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828254" comment="libpng-1.5.13-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828255" comment="libpng-devel-1.5.13-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828256" comment="libpng-static-1.5.13-8.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828254" comment="libpng-1.5.13-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828255" comment="libpng-devel-1.5.13-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828256" comment="libpng-static-1.5.13-8.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:980" version="1" class="patch">
	<metadata>
		<title>security update for libtiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-14973" ref_url="https://www.suse.com/security/cve/CVE-2019-14973/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3902.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3902.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14973/">CVE-2019-14973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14973">CVE-2019-14973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17546">CVE-2019-17546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828257" comment="libtiff-4.0.3-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828258" comment="libtiff-devel-4.0.3-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828259" comment="libtiff-static-4.0.3-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828260" comment="libtiff-tools-4.0.3-35.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828257" comment="libtiff-4.0.3-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828258" comment="libtiff-devel-4.0.3-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828259" comment="libtiff-static-4.0.3-35.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828260" comment="libtiff-tools-4.0.3-35.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:981" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2019-20382" ref_url="https://www.suse.com/security/cve/CVE-2019-20382/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3906.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3906.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15746">CVE-2018-15746 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20382/">CVE-2019-20382 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20382">CVE-2019-20382 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828261" comment="qemu-img-1.5.3-175.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828262" comment="qemu-kvm-1.5.3-175.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828263" comment="qemu-kvm-common-1.5.3-175.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828264" comment="qemu-kvm-tools-1.5.3-175.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:982" version="1" class="patch">
	<metadata>
		<title>security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3908.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3908.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14866">CVE-2019-14866 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828265" comment="cpio-2.11-28.el7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828265" comment="cpio-2.11-28.el7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:983" version="1" class="patch">
	<metadata>
		<title>security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3911.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3911.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828266" comment="python-2.7.5-89.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828267" comment="python-debug-2.7.5-89.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828268" comment="python-devel-2.7.5-89.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828269" comment="python-libs-2.7.5-89.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828270" comment="python-test-2.7.5-89.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828271" comment="python-tools-2.7.5-89.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828272" comment="tkinter-2.7.5-89.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:984" version="1" class="patch">
	<metadata>
		<title>security update for libssh2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3915.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3915.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828273" comment="libssh2-1.8.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828274" comment="libssh2-devel-1.8.0-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828275" comment="libssh2-docs-1.8.0-4.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:985" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3916.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3916.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828276" comment="curl-7.29.0-59.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828277" comment="libcurl-7.29.0-59.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828278" comment="libcurl-devel-7.29.0-59.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:986" version="1" class="patch">
	<metadata>
		<title>security update for libsndfile (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-19662" ref_url="https://www.suse.com/security/cve/CVE-2018-19662/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3922.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3922.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19662/">CVE-2018-19662 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19662">CVE-2018-19662 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828279" comment="libsndfile-1.0.25-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828280" comment="libsndfile-devel-1.0.25-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828281" comment="libsndfile-utils-1.0.25-12.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:987" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2015-9251" ref_url="https://www.suse.com/security/cve/CVE-2015-9251/" source="CVE"/>
		<reference ref_id="CVE-2016-10735" ref_url="https://www.suse.com/security/cve/CVE-2016-10735/" source="CVE"/>
		<reference ref_id="CVE-2018-14040" ref_url="https://www.suse.com/security/cve/CVE-2018-14040/" source="CVE"/>
		<reference ref_id="CVE-2018-14042" ref_url="https://www.suse.com/security/cve/CVE-2018-14042/" source="CVE"/>
		<reference ref_id="CVE-2018-20676" ref_url="https://www.suse.com/security/cve/CVE-2018-20676/" source="CVE"/>
		<reference ref_id="CVE-2018-20677" ref_url="https://www.suse.com/security/cve/CVE-2018-20677/" source="CVE"/>
		<reference ref_id="CVE-2019-11358" ref_url="https://www.suse.com/security/cve/CVE-2019-11358/" source="CVE"/>
		<reference ref_id="CVE-2019-8331" ref_url="https://www.suse.com/security/cve/CVE-2019-8331/" source="CVE"/>
		<reference ref_id="CVE-2020-11022" ref_url="https://www.suse.com/security/cve/CVE-2020-11022/" source="CVE"/>
		<reference ref_id="CVE-2020-1722" ref_url="https://www.suse.com/security/cve/CVE-2020-1722/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3936.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3936.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9251/">CVE-2015-9251 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">CVE-2015-9251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10735/">CVE-2016-10735 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10735">CVE-2016-10735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14040/">CVE-2018-14040 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14040">CVE-2018-14040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14042/">CVE-2018-14042 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14042">CVE-2018-14042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20676/">CVE-2018-20676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20676">CVE-2018-20676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20677/">CVE-2018-20677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20677">CVE-2018-20677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11358/">CVE-2019-11358 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11358">CVE-2019-11358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8331/">CVE-2019-8331 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8331">CVE-2019-8331 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11022/">CVE-2020-11022 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11022">CVE-2020-11022 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1722/">CVE-2020-1722 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1722">CVE-2020-1722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828282" comment="ipa-client-4.6.8-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828283" comment="ipa-client-common-4.6.8-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828284" comment="ipa-common-4.6.8-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828285" comment="ipa-python-compat-4.6.8-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828286" comment="ipa-server-4.6.8-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828287" comment="ipa-server-common-4.6.8-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828288" comment="ipa-server-dns-4.6.8-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828289" comment="ipa-server-trust-ad-4.6.8-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828290" comment="python2-ipaclient-4.6.8-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828291" comment="python2-ipalib-4.6.8-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828292" comment="python2-ipaserver-4.6.8-5.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:988" version="1" class="patch">
	<metadata>
		<title>security update for openwsman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3940.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3940.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3833">CVE-2019-3833 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828293" comment="libwsman-devel-2.6.3-7.git4391e5c.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828294" comment="libwsman1-2.6.3-7.git4391e5c.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828295" comment="openwsman-client-2.6.3-7.git4391e5c.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828296" comment="openwsman-perl-2.6.3-7.git4391e5c.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828297" comment="openwsman-python-2.6.3-7.git4391e5c.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828298" comment="openwsman-ruby-2.6.3-7.git4391e5c.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828299" comment="openwsman-server-2.6.3-7.git4391e5c.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828293" comment="libwsman-devel-2.6.3-7.git4391e5c.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828294" comment="libwsman1-2.6.3-7.git4391e5c.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828295" comment="openwsman-client-2.6.3-7.git4391e5c.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828296" comment="openwsman-perl-2.6.3-7.git4391e5c.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828297" comment="openwsman-python-2.6.3-7.git4391e5c.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828298" comment="openwsman-ruby-2.6.3-7.git4391e5c.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828299" comment="openwsman-server-2.6.3-7.git4391e5c.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:989" version="1" class="patch">
	<metadata>
		<title>security update for libwmf (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3943.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3943.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6978">CVE-2019-6978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828300" comment="libwmf-0.2.8.4-44.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828301" comment="libwmf-devel-0.2.8.4-44.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828302" comment="libwmf-lite-0.2.8.4-44.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828300" comment="libwmf-0.2.8.4-44.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828301" comment="libwmf-devel-0.2.8.4-44.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828302" comment="libwmf-lite-0.2.8.4-44.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:990" version="1" class="patch">
	<metadata>
		<title>security update for librabbitmq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-18609" ref_url="https://www.suse.com/security/cve/CVE-2019-18609/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3949.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3949.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18609/">CVE-2019-18609 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18609">CVE-2019-18609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828303" comment="librabbitmq-0.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828304" comment="librabbitmq-devel-0.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828305" comment="librabbitmq-examples-0.8.0-3.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828303" comment="librabbitmq-0.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828304" comment="librabbitmq-devel-0.8.0-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828305" comment="librabbitmq-examples-0.8.0-3.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:991" version="1" class="patch">
	<metadata>
		<title>security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3952.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3952.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20843">CVE-2018-20843 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828306" comment="expat-2.1.0-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828307" comment="expat-devel-2.1.0-12.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828308" comment="expat-static-2.1.0-12.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:992" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-15715" ref_url="https://www.suse.com/security/cve/CVE-2017-15715/" source="CVE"/>
		<reference ref_id="CVE-2018-1283" ref_url="https://www.suse.com/security/cve/CVE-2018-1283/" source="CVE"/>
		<reference ref_id="CVE-2018-1303" ref_url="https://www.suse.com/security/cve/CVE-2018-1303/" source="CVE"/>
		<reference ref_id="CVE-2019-10098" ref_url="https://www.suse.com/security/cve/CVE-2019-10098/" source="CVE"/>
		<reference ref_id="CVE-2020-1927" ref_url="https://www.suse.com/security/cve/CVE-2020-1927/" source="CVE"/>
		<reference ref_id="CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3958.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3958.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15715/">CVE-2017-15715 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15715">CVE-2017-15715 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1283/">CVE-2018-1283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1283">CVE-2018-1283 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1303/">CVE-2018-1303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1303">CVE-2018-1303 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10098/">CVE-2019-10098 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10098">CVE-2019-10098 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1927/">CVE-2020-1927 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1927">CVE-2020-1927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1934">CVE-2020-1934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828309" comment="httpd-2.4.6-95.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828310" comment="httpd-devel-2.4.6-95.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828311" comment="httpd-manual-2.4.6-95.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828312" comment="httpd-tools-2.4.6-95.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828313" comment="mod_ldap-2.4.6-95.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828314" comment="mod_proxy_html-2.4.6-95.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828315" comment="mod_session-2.4.6-95.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828316" comment="mod_ssl-2.4.6-95.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:993" version="1" class="patch">
	<metadata>
		<title>security update for fontforge (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-5395" ref_url="https://www.suse.com/security/cve/CVE-2020-5395/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3966.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3966.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5395/">CVE-2020-5395 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-5395">CVE-2020-5395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828317" comment="fontforge-20120731b-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828318" comment="fontforge-devel-20120731b-13.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828317" comment="fontforge-20120731b-13.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828318" comment="fontforge-devel-20120731b-13.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:994" version="1" class="patch">
	<metadata>
		<title>security update for mod_auth_openidc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-14857" ref_url="https://www.suse.com/security/cve/CVE-2019-14857/" source="CVE"/>
		<reference ref_id="CVE-2019-20479" ref_url="https://www.suse.com/security/cve/CVE-2019-20479/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3970.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3970.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14857/">CVE-2019-14857 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14857">CVE-2019-14857 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20479/">CVE-2019-20479 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20479">CVE-2019-20479 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828319" comment="mod_auth_openidc-1.8.8-7.el7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:995" version="1" class="patch">
	<metadata>
		<title>security update for hunspell (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-16707" ref_url="https://www.suse.com/security/cve/CVE-2019-16707/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3971.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3971.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16707/">CVE-2019-16707 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16707">CVE-2019-16707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828320" comment="hunspell-1.3.2-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828321" comment="hunspell-devel-1.3.2-16.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828320" comment="hunspell-1.3.2-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828321" comment="hunspell-devel-1.3.2-16.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:996" version="1" class="patch">
	<metadata>
		<title>security update for subversion (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-11782" ref_url="https://www.suse.com/security/cve/CVE-2018-11782/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3972.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3972.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11782/">CVE-2018-11782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11782">CVE-2018-11782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828322" comment="mod_dav_svn-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828323" comment="subversion-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828324" comment="subversion-devel-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828325" comment="subversion-gnome-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828326" comment="subversion-javahl-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828327" comment="subversion-kde-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828328" comment="subversion-libs-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828329" comment="subversion-perl-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828330" comment="subversion-python-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828331" comment="subversion-ruby-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828332" comment="subversion-tools-1.7.14-16.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828322" comment="mod_dav_svn-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828323" comment="subversion-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828324" comment="subversion-devel-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828325" comment="subversion-gnome-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828326" comment="subversion-javahl-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828327" comment="subversion-kde-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828328" comment="subversion-libs-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828329" comment="subversion-perl-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828330" comment="subversion-python-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828331" comment="subversion-ruby-1.7.14-16.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828332" comment="subversion-tools-1.7.14-16.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:997" version="1" class="patch">
	<metadata>
		<title>security update for spamassassin (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-12420" ref_url="https://www.suse.com/security/cve/CVE-2019-12420/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3973.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3973.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12420/">CVE-2019-12420 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12420">CVE-2019-12420 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828333" comment="spamassassin-3.4.0-6.el7 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828333" comment="spamassassin-3.4.0-6.el7 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:998" version="1" class="patch">
	<metadata>
		<title>security update for evince (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-14494" ref_url="https://www.suse.com/security/cve/CVE-2019-14494/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3977.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3977.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14494/">CVE-2019-14494 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14494">CVE-2019-14494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828334" comment="evince-3.28.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828335" comment="evince-browser-plugin-3.28.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828336" comment="evince-devel-3.28.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828337" comment="evince-dvi-3.28.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828338" comment="evince-libs-3.28.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828339" comment="evince-nautilus-3.28.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828340" comment="poppler-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828341" comment="poppler-cpp-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828342" comment="poppler-cpp-devel-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828343" comment="poppler-demos-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828344" comment="poppler-devel-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828345" comment="poppler-glib-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828346" comment="poppler-glib-devel-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828347" comment="poppler-qt-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828348" comment="poppler-qt-devel-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828349" comment="poppler-utils-0.26.5-43.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828334" comment="evince-3.28.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828335" comment="evince-browser-plugin-3.28.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828336" comment="evince-devel-3.28.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828337" comment="evince-dvi-3.28.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828338" comment="evince-libs-3.28.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828339" comment="evince-nautilus-3.28.2-10.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828340" comment="poppler-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828341" comment="poppler-cpp-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828342" comment="poppler-cpp-devel-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828343" comment="poppler-demos-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828344" comment="poppler-devel-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828345" comment="poppler-glib-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828346" comment="poppler-glib-devel-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828347" comment="poppler-qt-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828348" comment="poppler-qt-devel-0.26.5-43.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828349" comment="poppler-utils-0.26.5-43.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:999" version="1" class="patch">
	<metadata>
		<title>security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3978.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3978.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12450">CVE-2019-12450 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14822">CVE-2019-14822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828350" comment="glib2-2.56.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828351" comment="glib2-devel-2.56.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828352" comment="glib2-doc-2.56.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828353" comment="glib2-fam-2.56.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828354" comment="glib2-static-2.56.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828355" comment="glib2-tests-2.56.1-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828356" comment="ibus-1.5.17-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828357" comment="ibus-devel-1.5.17-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828358" comment="ibus-devel-docs-1.5.17-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828359" comment="ibus-gtk2-1.5.17-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828360" comment="ibus-gtk3-1.5.17-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828361" comment="ibus-libs-1.5.17-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828362" comment="ibus-pygtk2-1.5.17-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828363" comment="ibus-setup-1.5.17-11.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1000" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3981.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3981.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14907">CVE-2019-14907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828364" comment="ctdb-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828365" comment="ctdb-tests-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828366" comment="libsmbclient-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828367" comment="libsmbclient-devel-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828368" comment="libwbclient-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828369" comment="libwbclient-devel-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828370" comment="samba-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828371" comment="samba-client-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828372" comment="samba-client-libs-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828373" comment="samba-common-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828374" comment="samba-common-libs-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828375" comment="samba-common-tools-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828376" comment="samba-dc-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828377" comment="samba-dc-libs-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828378" comment="samba-devel-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828379" comment="samba-krb5-printing-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828380" comment="samba-libs-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828381" comment="samba-pidl-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828382" comment="samba-python-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828383" comment="samba-python-test-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828384" comment="samba-test-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828385" comment="samba-test-libs-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828386" comment="samba-vfs-glusterfs-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828387" comment="samba-winbind-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828388" comment="samba-winbind-clients-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828389" comment="samba-winbind-krb5-locator-4.10.16-5.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828390" comment="samba-winbind-modules-4.10.16-5.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1001" version="1" class="patch">
	<metadata>
		<title>security update for freeradius (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-10143" ref_url="https://www.suse.com/security/cve/CVE-2019-10143/" source="CVE"/>
		<reference ref_id="CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456/" source="CVE"/>
		<reference ref_id="CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3984.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3984.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10143/">CVE-2019-10143 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10143">CVE-2019-10143 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13456">CVE-2019-13456 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17185">CVE-2019-17185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828391" comment="freeradius-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828392" comment="freeradius-devel-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828393" comment="freeradius-doc-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828394" comment="freeradius-krb5-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828395" comment="freeradius-ldap-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828396" comment="freeradius-mysql-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828397" comment="freeradius-perl-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828398" comment="freeradius-postgresql-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828399" comment="freeradius-python-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828400" comment="freeradius-sqlite-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828401" comment="freeradius-unixODBC-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828402" comment="freeradius-utils-3.0.13-15.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828391" comment="freeradius-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828392" comment="freeradius-devel-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828393" comment="freeradius-doc-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828394" comment="freeradius-krb5-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828395" comment="freeradius-ldap-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828396" comment="freeradius-mysql-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828397" comment="freeradius-perl-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828398" comment="freeradius-postgresql-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828399" comment="freeradius-python-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828400" comment="freeradius-sqlite-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828401" comment="freeradius-unixODBC-3.0.13-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828402" comment="freeradius-utils-3.0.13-15.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1002" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:3996.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:3996.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19956">CVE-2019-19956 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828403" comment="libxml2-2.9.1-6.el7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828404" comment="libxml2-devel-2.9.1-6.el7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828405" comment="libxml2-python-2.9.1-6.el7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828406" comment="libxml2-static-2.9.1-6.el7.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1003" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-20485" ref_url="https://www.suse.com/security/cve/CVE-2019-20485/" source="CVE"/>
		<reference ref_id="CVE-2020-10703" ref_url="https://www.suse.com/security/cve/CVE-2020-10703/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4000.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4000.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20485/">CVE-2019-20485 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20485">CVE-2019-20485 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10703/">CVE-2020-10703 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10703">CVE-2020-10703 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828407" comment="libvirt-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828408" comment="libvirt-admin-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828409" comment="libvirt-bash-completion-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828410" comment="libvirt-client-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828411" comment="libvirt-daemon-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828412" comment="libvirt-daemon-config-network-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828413" comment="libvirt-daemon-config-nwfilter-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828414" comment="libvirt-daemon-driver-interface-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828415" comment="libvirt-daemon-driver-lxc-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828416" comment="libvirt-daemon-driver-network-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828417" comment="libvirt-daemon-driver-nodedev-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828418" comment="libvirt-daemon-driver-nwfilter-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828419" comment="libvirt-daemon-driver-qemu-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828420" comment="libvirt-daemon-driver-secret-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828421" comment="libvirt-daemon-driver-storage-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828422" comment="libvirt-daemon-driver-storage-core-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828423" comment="libvirt-daemon-driver-storage-disk-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828424" comment="libvirt-daemon-driver-storage-gluster-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828425" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828426" comment="libvirt-daemon-driver-storage-logical-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828427" comment="libvirt-daemon-driver-storage-mpath-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828428" comment="libvirt-daemon-driver-storage-rbd-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828429" comment="libvirt-daemon-driver-storage-scsi-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828430" comment="libvirt-daemon-kvm-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828431" comment="libvirt-daemon-lxc-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828432" comment="libvirt-devel-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828433" comment="libvirt-docs-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828434" comment="libvirt-libs-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828435" comment="libvirt-lock-sanlock-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828436" comment="libvirt-login-shell-4.5.0-36.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828437" comment="libvirt-nss-4.5.0-36.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1004" version="1" class="patch">
	<metadata>
		<title>security update for bluez (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4001.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4001.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0556">CVE-2020-0556 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828438" comment="bluez-5.44-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828439" comment="bluez-cups-5.44-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828440" comment="bluez-hid2hci-5.44-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828441" comment="bluez-libs-5.44-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828442" comment="bluez-libs-devel-5.44-7.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828438" comment="bluez-5.44-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828439" comment="bluez-cups-5.44-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828440" comment="bluez-hid2hci-5.44-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828441" comment="bluez-libs-5.44-7.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828442" comment="bluez-libs-devel-5.44-7.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1005" version="1" class="patch">
	<metadata>
		<title>security update for NetworkManager (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-10754" ref_url="https://www.suse.com/security/cve/CVE-2020-10754/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4003.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4003.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10754/">CVE-2020-10754 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10754">CVE-2020-10754 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828443" comment="NetworkManager-1.18.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828444" comment="NetworkManager-adsl-1.18.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828445" comment="NetworkManager-bluetooth-1.18.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828446" comment="NetworkManager-config-server-1.18.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828447" comment="NetworkManager-dispatcher-routing-rules-1.18.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828448" comment="NetworkManager-glib-1.18.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828449" comment="NetworkManager-glib-devel-1.18.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828450" comment="NetworkManager-libnm-1.18.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828451" comment="NetworkManager-libnm-devel-1.18.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828452" comment="NetworkManager-ovs-1.18.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828453" comment="NetworkManager-ppp-1.18.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828454" comment="NetworkManager-team-1.18.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828455" comment="NetworkManager-tui-1.18.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828456" comment="NetworkManager-wifi-1.18.8-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828457" comment="NetworkManager-wwan-1.18.8-1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1006" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4004.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4004.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17563">CVE-2019-17563 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13935">CVE-2020-13935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828458" comment="tomcat-7.0.76-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828459" comment="tomcat-admin-webapps-7.0.76-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828460" comment="tomcat-docs-webapp-7.0.76-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828461" comment="tomcat-el-2.2-api-7.0.76-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828462" comment="tomcat-javadoc-7.0.76-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828463" comment="tomcat-jsp-2.2-api-7.0.76-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828464" comment="tomcat-jsvc-7.0.76-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828465" comment="tomcat-lib-7.0.76-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828466" comment="tomcat-servlet-3.0-api-7.0.76-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828467" comment="tomcat-webapps-7.0.76-15.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1007" version="1" class="patch">
	<metadata>
		<title>security update for libxslt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4005.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4005.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828468" comment="libxslt-1.1.28-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828469" comment="libxslt-devel-1.1.28-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828470" comment="libxslt-python-1.1.28-6.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828468" comment="libxslt-1.1.28-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828469" comment="libxslt-devel-1.1.28-6.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828470" comment="libxslt-python-1.1.28-6.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1008" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-20386" ref_url="https://www.suse.com/security/cve/CVE-2019-20386/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4007.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4007.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20386/">CVE-2019-20386 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">CVE-2019-20386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828471" comment="libgudev1-219-78.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828472" comment="libgudev1-devel-219-78.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828473" comment="systemd-219-78.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828474" comment="systemd-devel-219-78.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828475" comment="systemd-journal-gateway-219-78.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828476" comment="systemd-libs-219-78.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828477" comment="systemd-networkd-219-78.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828478" comment="systemd-python-219-78.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828479" comment="systemd-resolved-219-78.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828480" comment="systemd-sysv-219-78.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1009" version="1" class="patch">
	<metadata>
		<title>security update for e2fsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-5094" ref_url="https://www.suse.com/security/cve/CVE-2019-5094/" source="CVE"/>
		<reference ref_id="CVE-2019-5188" ref_url="https://www.suse.com/security/cve/CVE-2019-5188/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4011.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4011.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5094/">CVE-2019-5094 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5094">CVE-2019-5094 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5188/">CVE-2019-5188 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5188">CVE-2019-5188 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828481" comment="e2fsprogs-1.42.9-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828482" comment="e2fsprogs-devel-1.42.9-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828483" comment="e2fsprogs-libs-1.42.9-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828484" comment="e2fsprogs-static-1.42.9-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828485" comment="libcom_err-1.42.9-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828486" comment="libcom_err-devel-1.42.9-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828487" comment="libss-1.42.9-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828488" comment="libss-devel-1.42.9-19.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828481" comment="e2fsprogs-1.42.9-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828482" comment="e2fsprogs-devel-1.42.9-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828483" comment="e2fsprogs-libs-1.42.9-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828484" comment="e2fsprogs-static-1.42.9-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828485" comment="libcom_err-1.42.9-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828486" comment="libcom_err-devel-1.42.9-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828487" comment="libss-1.42.9-19.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828488" comment="libss-devel-1.42.9-19.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1010" version="1" class="patch">
	<metadata>
		<title>security update for okular (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-9359" ref_url="https://www.suse.com/security/cve/CVE-2020-9359/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4024.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4024.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9359/">CVE-2020-9359 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9359">CVE-2020-9359 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828489" comment="okular-4.10.5-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828490" comment="okular-devel-4.10.5-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828491" comment="okular-libs-4.10.5-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828492" comment="okular-part-4.10.5-9.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828489" comment="okular-4.10.5-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828490" comment="okular-devel-4.10.5-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828491" comment="okular-libs-4.10.5-9.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828492" comment="okular-part-4.10.5-9.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1011" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569/" source="CVE"/>
		<reference ref_id="CVE-2020-0570" ref_url="https://www.suse.com/security/cve/CVE-2020-0570/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4025.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4025.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0569">CVE-2020-0569 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0570/">CVE-2020-0570 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0570">CVE-2020-0570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828493" comment="qt5-qtbase-5.9.7-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828494" comment="qt5-qtbase-common-5.9.7-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828495" comment="qt5-qtbase-devel-5.9.7-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828496" comment="qt5-qtbase-doc-5.9.7-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828497" comment="qt5-qtbase-examples-5.9.7-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828498" comment="qt5-qtbase-gui-5.9.7-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828499" comment="qt5-qtbase-mysql-5.9.7-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828500" comment="qt5-qtbase-odbc-5.9.7-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828501" comment="qt5-qtbase-postgresql-5.9.7-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828502" comment="qt5-qtbase-static-5.9.7-4.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828503" comment="qt5-rpm-macros-5.9.7-4.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1012" version="1" class="patch">
	<metadata>
		<title>security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574/" source="CVE"/>
		<reference ref_id="CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752/" source="CVE"/>
		<reference ref_id="CVE-2020-2780" ref_url="https://www.suse.com/security/cve/CVE-2020-2780/" source="CVE"/>
		<reference ref_id="CVE-2020-2812" ref_url="https://www.suse.com/security/cve/CVE-2020-2812/" source="CVE"/>
		<reference ref_id="CVE-2021-2144" ref_url="https://www.suse.com/security/cve/CVE-2021-2144/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4026.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4026.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2974">CVE-2019-2974 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2574">CVE-2020-2574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2752">CVE-2020-2752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2780/">CVE-2020-2780 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2780">CVE-2020-2780 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2812/">CVE-2020-2812 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2812">CVE-2020-2812 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-2144/">CVE-2021-2144 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2144">CVE-2021-2144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828504" comment="mariadb-5.5.68-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828505" comment="mariadb-bench-5.5.68-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828506" comment="mariadb-devel-5.5.68-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828507" comment="mariadb-embedded-5.5.68-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828508" comment="mariadb-embedded-devel-5.5.68-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828509" comment="mariadb-libs-5.5.68-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828510" comment="mariadb-server-5.5.68-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828511" comment="mariadb-test-5.5.68-1.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828504" comment="mariadb-5.5.68-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828505" comment="mariadb-bench-5.5.68-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828506" comment="mariadb-devel-5.5.68-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828507" comment="mariadb-embedded-5.5.68-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828508" comment="mariadb-embedded-devel-5.5.68-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828509" comment="mariadb-libs-5.5.68-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828510" comment="mariadb-server-5.5.68-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828511" comment="mariadb-test-5.5.68-1.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1013" version="1" class="patch">
	<metadata>
		<title>security update for exiv2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-17402" ref_url="https://www.suse.com/security/cve/CVE-2019-17402/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4030.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4030.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17402/">CVE-2019-17402 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17402">CVE-2019-17402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828512" comment="exiv2-0.27.0-3.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828513" comment="exiv2-devel-0.27.0-3.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828514" comment="exiv2-doc-0.27.0-3.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828515" comment="exiv2-libs-0.27.0-3.el7_8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1014" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-11018" ref_url="https://www.suse.com/security/cve/CVE-2020-11018/" source="CVE"/>
		<reference ref_id="CVE-2020-11019" ref_url="https://www.suse.com/security/cve/CVE-2020-11019/" source="CVE"/>
		<reference ref_id="CVE-2020-11038" ref_url="https://www.suse.com/security/cve/CVE-2020-11038/" source="CVE"/>
		<reference ref_id="CVE-2020-11039" ref_url="https://www.suse.com/security/cve/CVE-2020-11039/" source="CVE"/>
		<reference ref_id="CVE-2020-11040" ref_url="https://www.suse.com/security/cve/CVE-2020-11040/" source="CVE"/>
		<reference ref_id="CVE-2020-11041" ref_url="https://www.suse.com/security/cve/CVE-2020-11041/" source="CVE"/>
		<reference ref_id="CVE-2020-11042" ref_url="https://www.suse.com/security/cve/CVE-2020-11042/" source="CVE"/>
		<reference ref_id="CVE-2020-11043" ref_url="https://www.suse.com/security/cve/CVE-2020-11043/" source="CVE"/>
		<reference ref_id="CVE-2020-11044" ref_url="https://www.suse.com/security/cve/CVE-2020-11044/" source="CVE"/>
		<reference ref_id="CVE-2020-11045" ref_url="https://www.suse.com/security/cve/CVE-2020-11045/" source="CVE"/>
		<reference ref_id="CVE-2020-11046" ref_url="https://www.suse.com/security/cve/CVE-2020-11046/" source="CVE"/>
		<reference ref_id="CVE-2020-11047" ref_url="https://www.suse.com/security/cve/CVE-2020-11047/" source="CVE"/>
		<reference ref_id="CVE-2020-11048" ref_url="https://www.suse.com/security/cve/CVE-2020-11048/" source="CVE"/>
		<reference ref_id="CVE-2020-11049" ref_url="https://www.suse.com/security/cve/CVE-2020-11049/" source="CVE"/>
		<reference ref_id="CVE-2020-11058" ref_url="https://www.suse.com/security/cve/CVE-2020-11058/" source="CVE"/>
		<reference ref_id="CVE-2020-11085" ref_url="https://www.suse.com/security/cve/CVE-2020-11085/" source="CVE"/>
		<reference ref_id="CVE-2020-11086" ref_url="https://www.suse.com/security/cve/CVE-2020-11086/" source="CVE"/>
		<reference ref_id="CVE-2020-11087" ref_url="https://www.suse.com/security/cve/CVE-2020-11087/" source="CVE"/>
		<reference ref_id="CVE-2020-11088" ref_url="https://www.suse.com/security/cve/CVE-2020-11088/" source="CVE"/>
		<reference ref_id="CVE-2020-11089" ref_url="https://www.suse.com/security/cve/CVE-2020-11089/" source="CVE"/>
		<reference ref_id="CVE-2020-11522" ref_url="https://www.suse.com/security/cve/CVE-2020-11522/" source="CVE"/>
		<reference ref_id="CVE-2020-11525" ref_url="https://www.suse.com/security/cve/CVE-2020-11525/" source="CVE"/>
		<reference ref_id="CVE-2020-11526" ref_url="https://www.suse.com/security/cve/CVE-2020-11526/" source="CVE"/>
		<reference ref_id="CVE-2020-13396" ref_url="https://www.suse.com/security/cve/CVE-2020-13396/" source="CVE"/>
		<reference ref_id="CVE-2020-13397" ref_url="https://www.suse.com/security/cve/CVE-2020-13397/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4031.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4031.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11018/">CVE-2020-11018 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11018">CVE-2020-11018 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11019/">CVE-2020-11019 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11019">CVE-2020-11019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11038/">CVE-2020-11038 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11038">CVE-2020-11038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11039/">CVE-2020-11039 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11039">CVE-2020-11039 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11040/">CVE-2020-11040 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11040">CVE-2020-11040 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11041/">CVE-2020-11041 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11041">CVE-2020-11041 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11042/">CVE-2020-11042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11042">CVE-2020-11042 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11043/">CVE-2020-11043 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11043">CVE-2020-11043 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11044/">CVE-2020-11044 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11044">CVE-2020-11044 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11045/">CVE-2020-11045 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11045">CVE-2020-11045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11046/">CVE-2020-11046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11046">CVE-2020-11046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11047/">CVE-2020-11047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11047">CVE-2020-11047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11048/">CVE-2020-11048 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11048">CVE-2020-11048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11049/">CVE-2020-11049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11049">CVE-2020-11049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11058/">CVE-2020-11058 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11058">CVE-2020-11058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11085/">CVE-2020-11085 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11085">CVE-2020-11085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11086/">CVE-2020-11086 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11086">CVE-2020-11086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11087/">CVE-2020-11087 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11087">CVE-2020-11087 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11088/">CVE-2020-11088 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11088">CVE-2020-11088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11089/">CVE-2020-11089 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11089">CVE-2020-11089 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11522/">CVE-2020-11522 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11522">CVE-2020-11522 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11525/">CVE-2020-11525 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11525">CVE-2020-11525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11526/">CVE-2020-11526 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11526">CVE-2020-11526 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13396/">CVE-2020-13396 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13396">CVE-2020-13396 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13397/">CVE-2020-13397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13397">CVE-2020-13397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828516" comment="freerdp-2.1.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828517" comment="freerdp-devel-2.1.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828518" comment="freerdp-libs-2.1.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828519" comment="libwinpr-2.1.1-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828520" comment="libwinpr-devel-2.1.1-2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1015" version="1" class="patch">
	<metadata>
		<title>security update for dbus (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4032.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4032.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828521" comment="dbus-1.10.24-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828522" comment="dbus-devel-1.10.24-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828523" comment="dbus-doc-1.10.24-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828524" comment="dbus-libs-1.10.24-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828525" comment="dbus-tests-1.10.24-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828526" comment="dbus-x11-1.10.24-15.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828521" comment="dbus-1.10.24-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828522" comment="dbus-devel-1.10.24-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828523" comment="dbus-doc-1.10.24-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828524" comment="dbus-libs-1.10.24-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828525" comment="dbus-tests-1.10.24-15.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828526" comment="dbus-x11-1.10.24-15.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1016" version="1" class="patch">
	<metadata>
		<title>security update for webkitgtk4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070/" source="CVE"/>
		<reference ref_id="CVE-2019-6237" ref_url="https://www.suse.com/security/cve/CVE-2019-6237/" source="CVE"/>
		<reference ref_id="CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251/" source="CVE"/>
		<reference ref_id="CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506/" source="CVE"/>
		<reference ref_id="CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524/" source="CVE"/>
		<reference ref_id="CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535/" source="CVE"/>
		<reference ref_id="CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536/" source="CVE"/>
		<reference ref_id="CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="CVE-2019-8571" ref_url="https://www.suse.com/security/cve/CVE-2019-8571/" source="CVE"/>
		<reference ref_id="CVE-2019-8583" ref_url="https://www.suse.com/security/cve/CVE-2019-8583/" source="CVE"/>
		<reference ref_id="CVE-2019-8584" ref_url="https://www.suse.com/security/cve/CVE-2019-8584/" source="CVE"/>
		<reference ref_id="CVE-2019-8586" ref_url="https://www.suse.com/security/cve/CVE-2019-8586/" source="CVE"/>
		<reference ref_id="CVE-2019-8587" ref_url="https://www.suse.com/security/cve/CVE-2019-8587/" source="CVE"/>
		<reference ref_id="CVE-2019-8594" ref_url="https://www.suse.com/security/cve/CVE-2019-8594/" source="CVE"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8596" ref_url="https://www.suse.com/security/cve/CVE-2019-8596/" source="CVE"/>
		<reference ref_id="CVE-2019-8597" ref_url="https://www.suse.com/security/cve/CVE-2019-8597/" source="CVE"/>
		<reference ref_id="CVE-2019-8601" ref_url="https://www.suse.com/security/cve/CVE-2019-8601/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8608" ref_url="https://www.suse.com/security/cve/CVE-2019-8608/" source="CVE"/>
		<reference ref_id="CVE-2019-8609" ref_url="https://www.suse.com/security/cve/CVE-2019-8609/" source="CVE"/>
		<reference ref_id="CVE-2019-8610" ref_url="https://www.suse.com/security/cve/CVE-2019-8610/" source="CVE"/>
		<reference ref_id="CVE-2019-8611" ref_url="https://www.suse.com/security/cve/CVE-2019-8611/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8619" ref_url="https://www.suse.com/security/cve/CVE-2019-8619/" source="CVE"/>
		<reference ref_id="CVE-2019-8622" ref_url="https://www.suse.com/security/cve/CVE-2019-8622/" source="CVE"/>
		<reference ref_id="CVE-2019-8623" ref_url="https://www.suse.com/security/cve/CVE-2019-8623/" source="CVE"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8674" ref_url="https://www.suse.com/security/cve/CVE-2019-8674/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="CVE-2019-8707" ref_url="https://www.suse.com/security/cve/CVE-2019-8707/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726/" source="CVE"/>
		<reference ref_id="CVE-2019-8733" ref_url="https://www.suse.com/security/cve/CVE-2019-8733/" source="CVE"/>
		<reference ref_id="CVE-2019-8735" ref_url="https://www.suse.com/security/cve/CVE-2019-8735/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8763" ref_url="https://www.suse.com/security/cve/CVE-2019-8763/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8765" ref_url="https://www.suse.com/security/cve/CVE-2019-8765/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821/" source="CVE"/>
		<reference ref_id="CVE-2019-8822" ref_url="https://www.suse.com/security/cve/CVE-2019-8822/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<reference ref_id="CVE-2020-3885" ref_url="https://www.suse.com/security/cve/CVE-2020-3885/" source="CVE"/>
		<reference ref_id="CVE-2020-3894" ref_url="https://www.suse.com/security/cve/CVE-2020-3894/" source="CVE"/>
		<reference ref_id="CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895/" source="CVE"/>
		<reference ref_id="CVE-2020-3897" ref_url="https://www.suse.com/security/cve/CVE-2020-3897/" source="CVE"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<reference ref_id="CVE-2020-3900" ref_url="https://www.suse.com/security/cve/CVE-2020-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-3901" ref_url="https://www.suse.com/security/cve/CVE-2020-3901/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4035.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4035.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11070">CVE-2019-11070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6237/">CVE-2019-6237 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6237">CVE-2019-6237 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6251">CVE-2019-6251 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8506">CVE-2019-8506 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8524">CVE-2019-8524 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8535">CVE-2019-8535 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8536">CVE-2019-8536 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8544">CVE-2019-8544 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8551">CVE-2019-8551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8558">CVE-2019-8558 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8559">CVE-2019-8559 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8563">CVE-2019-8563 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8571/">CVE-2019-8571 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8571">CVE-2019-8571 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8583/">CVE-2019-8583 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8583">CVE-2019-8583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8584/">CVE-2019-8584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8584">CVE-2019-8584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8586/">CVE-2019-8586 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8586">CVE-2019-8586 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8587/">CVE-2019-8587 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8587">CVE-2019-8587 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8594/">CVE-2019-8594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8594">CVE-2019-8594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8595">CVE-2019-8595 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8596/">CVE-2019-8596 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8596">CVE-2019-8596 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8597/">CVE-2019-8597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8597">CVE-2019-8597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8601/">CVE-2019-8601 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8601">CVE-2019-8601 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8607">CVE-2019-8607 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8608/">CVE-2019-8608 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8608">CVE-2019-8608 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8609/">CVE-2019-8609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8609">CVE-2019-8609 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8610/">CVE-2019-8610 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8610">CVE-2019-8610 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8611/">CVE-2019-8611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8611">CVE-2019-8611 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8615">CVE-2019-8615 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8619/">CVE-2019-8619 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8619">CVE-2019-8619 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8622/">CVE-2019-8622 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8622">CVE-2019-8622 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8623/">CVE-2019-8623 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8623">CVE-2019-8623 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8625">CVE-2019-8625 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8644">CVE-2019-8644 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8649">CVE-2019-8649 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8658">CVE-2019-8658 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8666">CVE-2019-8666 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8669">CVE-2019-8669 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8671">CVE-2019-8671 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8672">CVE-2019-8672 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8673">CVE-2019-8673 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8674/">CVE-2019-8674 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8674">CVE-2019-8674 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8676">CVE-2019-8676 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8677">CVE-2019-8677 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8678">CVE-2019-8678 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8679">CVE-2019-8679 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8680">CVE-2019-8680 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8681">CVE-2019-8681 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8683">CVE-2019-8683 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8684">CVE-2019-8684 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8686">CVE-2019-8686 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8687">CVE-2019-8687 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8688">CVE-2019-8688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8689">CVE-2019-8689 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8690">CVE-2019-8690 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8707/">CVE-2019-8707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8707">CVE-2019-8707 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8710">CVE-2019-8710 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8719">CVE-2019-8719 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8720">CVE-2019-8720 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8726">CVE-2019-8726 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8733/">CVE-2019-8733 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8733">CVE-2019-8733 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8735/">CVE-2019-8735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8735">CVE-2019-8735 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8743">CVE-2019-8743 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8763/">CVE-2019-8763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8763">CVE-2019-8763 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8764">CVE-2019-8764 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8765/">CVE-2019-8765 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8765">CVE-2019-8765 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8766">CVE-2019-8766 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8768">CVE-2019-8768 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8769">CVE-2019-8769 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8771">CVE-2019-8771 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8782">CVE-2019-8782 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8783">CVE-2019-8783 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8808">CVE-2019-8808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8811">CVE-2019-8811 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8812">CVE-2019-8812 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8813">CVE-2019-8813 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8814">CVE-2019-8814 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8815">CVE-2019-8815 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8816">CVE-2019-8816 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8819">CVE-2019-8819 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8820">CVE-2019-8820 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8821">CVE-2019-8821 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8822/">CVE-2019-8822 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8822">CVE-2019-8822 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8823">CVE-2019-8823 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8835">CVE-2019-8835 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8844">CVE-2019-8844 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8846">CVE-2019-8846 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10018">CVE-2020-10018 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11793">CVE-2020-11793 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3862">CVE-2020-3862 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3864">CVE-2020-3864 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3865">CVE-2020-3865 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3867">CVE-2020-3867 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3868">CVE-2020-3868 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3885/">CVE-2020-3885 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3885">CVE-2020-3885 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3894/">CVE-2020-3894 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3894">CVE-2020-3894 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3895">CVE-2020-3895 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3897/">CVE-2020-3897 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3897">CVE-2020-3897 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3899">CVE-2020-3899 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3900/">CVE-2020-3900 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3900">CVE-2020-3900 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3901/">CVE-2020-3901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3901">CVE-2020-3901 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3902">CVE-2020-3902 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828527" comment="webkitgtk4-2.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828528" comment="webkitgtk4-devel-2.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828529" comment="webkitgtk4-doc-2.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828530" comment="webkitgtk4-jsc-2.28.2-2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828531" comment="webkitgtk4-jsc-devel-2.28.2-2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1017" version="1" class="patch">
	<metadata>
		<title>security update for OpenEXR (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-11761" ref_url="https://www.suse.com/security/cve/CVE-2020-11761/" source="CVE"/>
		<reference ref_id="CVE-2020-11763" ref_url="https://www.suse.com/security/cve/CVE-2020-11763/" source="CVE"/>
		<reference ref_id="CVE-2020-11764" ref_url="https://www.suse.com/security/cve/CVE-2020-11764/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4039.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4039.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11761/">CVE-2020-11761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11761">CVE-2020-11761 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11763/">CVE-2020-11763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11763">CVE-2020-11763 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11764/">CVE-2020-11764 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11764">CVE-2020-11764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828532" comment="OpenEXR-1.7.1-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828533" comment="OpenEXR-devel-1.7.1-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828534" comment="OpenEXR-libs-1.7.1-8.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828532" comment="OpenEXR-1.7.1-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828533" comment="OpenEXR-devel-1.7.1-8.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828534" comment="OpenEXR-libs-1.7.1-8.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1018" version="1" class="patch">
	<metadata>
		<title>security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-0182" ref_url="https://www.suse.com/security/cve/CVE-2020-0182/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4040.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4040.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0093">CVE-2020-0093 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0182/">CVE-2020-0182 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0182">CVE-2020-0182 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12767">CVE-2020-12767 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13113">CVE-2020-13113 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13114">CVE-2020-13114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828535" comment="libexif-0.6.22-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828536" comment="libexif-devel-0.6.22-1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828537" comment="libexif-doc-0.6.22-1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1019" version="1" class="patch">
	<metadata>
		<title>security update for openldap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4041.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4041.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12243">CVE-2020-12243 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828538" comment="openldap-2.4.44-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828539" comment="openldap-clients-2.4.44-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828540" comment="openldap-devel-2.4.44-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828541" comment="openldap-servers-2.4.44-22.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828542" comment="openldap-servers-sql-2.4.44-22.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1020" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807/" source="CVE"/>
		<reference ref_id="CVE-2019-15917" ref_url="https://www.suse.com/security/cve/CVE-2019-15917/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16994" ref_url="https://www.suse.com/security/cve/CVE-2019-16994/" source="CVE"/>
		<reference ref_id="CVE-2019-17053" ref_url="https://www.suse.com/security/cve/CVE-2019-17053/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808/" source="CVE"/>
		<reference ref_id="CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046/" source="CVE"/>
		<reference ref_id="CVE-2019-19055" ref_url="https://www.suse.com/security/cve/CVE-2019-19055/" source="CVE"/>
		<reference ref_id="CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058/" source="CVE"/>
		<reference ref_id="CVE-2019-19059" ref_url="https://www.suse.com/security/cve/CVE-2019-19059/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19807" ref_url="https://www.suse.com/security/cve/CVE-2019-19807/" source="CVE"/>
		<reference ref_id="CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054/" source="CVE"/>
		<reference ref_id="CVE-2019-20095" ref_url="https://www.suse.com/security/cve/CVE-2019-20095/" source="CVE"/>
		<reference ref_id="CVE-2019-20636" ref_url="https://www.suse.com/security/cve/CVE-2019-20636/" source="CVE"/>
		<reference ref_id="CVE-2019-9454" ref_url="https://www.suse.com/security/cve/CVE-2019-9454/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10742" ref_url="https://www.suse.com/security/cve/CVE-2020-10742/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11565" ref_url="https://www.suse.com/security/cve/CVE-2020-11565/" source="CVE"/>
		<reference ref_id="CVE-2020-12770" ref_url="https://www.suse.com/security/cve/CVE-2020-12770/" source="CVE"/>
		<reference ref_id="CVE-2020-12826" ref_url="https://www.suse.com/security/cve/CVE-2020-12826/" source="CVE"/>
		<reference ref_id="CVE-2020-14305" ref_url="https://www.suse.com/security/cve/CVE-2020-14305/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4060.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4060.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18551">CVE-2017-18551 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20836">CVE-2018-20836 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12614">CVE-2019-12614 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15217">CVE-2019-15217 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15807">CVE-2019-15807 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15917/">CVE-2019-15917 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15917">CVE-2019-15917 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16231">CVE-2019-16231 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16233">CVE-2019-16233 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16994/">CVE-2019-16994 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16994">CVE-2019-16994 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17053/">CVE-2019-17053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17053">CVE-2019-17053 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17055">CVE-2019-17055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18808">CVE-2019-18808 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19046">CVE-2019-19046 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19055/">CVE-2019-19055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19055">CVE-2019-19055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19058">CVE-2019-19058 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19059/">CVE-2019-19059 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19059">CVE-2019-19059 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19062">CVE-2019-19062 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19063">CVE-2019-19063 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19332">CVE-2019-19332 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19523">CVE-2019-19523 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19524">CVE-2019-19524 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19530">CVE-2019-19530 at NVD</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19534">CVE-2019-19534 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19537">CVE-2019-19537 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19767">CVE-2019-19767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19807/">CVE-2019-19807 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19807">CVE-2019-19807 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20054">CVE-2019-20054 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20095/">CVE-2019-20095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20095">CVE-2019-20095 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20636/">CVE-2019-20636 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20636">CVE-2019-20636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9454/">CVE-2019-9454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-9454">CVE-2019-9454 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9458">CVE-2019-9458 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10690">CVE-2020-10690 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10732">CVE-2020-10732 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10742/">CVE-2020-10742 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10742">CVE-2020-10742 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10751">CVE-2020-10751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10942">CVE-2020-10942 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-11565/">CVE-2020-11565 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11565">CVE-2020-11565 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12770/">CVE-2020-12770 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12770">CVE-2020-12770 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12826/">CVE-2020-12826 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12826">CVE-2020-12826 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14305/">CVE-2020-14305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14305">CVE-2020-14305 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2732">CVE-2020-2732 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8647">CVE-2020-8647 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8649">CVE-2020-8649 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9383">CVE-2020-9383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828543" comment="bpftool-3.10.0-1160.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828544" comment="kernel-3.10.0-1160.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828545" comment="kernel-abi-whitelists-3.10.0-1160.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828546" comment="kernel-debug-3.10.0-1160.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828549" comment="kernel-doc-3.10.0-1160.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828550" comment="kernel-headers-3.10.0-1160.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828551" comment="kernel-tools-3.10.0-1160.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828552" comment="kernel-tools-libs-3.10.0-1160.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828554" comment="perf-3.10.0-1160.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828555" comment="python-perf-3.10.0-1160.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1021" version="1" class="patch">
	<metadata>
		<title>security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4072.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4072.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12825">CVE-2020-12825 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828556" comment="libcroco-0.6.12-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828557" comment="libcroco-devel-0.6.12-6.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828556" comment="libcroco-0.6.12-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828557" comment="libcroco-devel-0.6.12-6.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1022" version="1" class="patch">
	<metadata>
		<title>security update for nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11756" ref_url="https://www.suse.com/security/cve/CVE-2019-11756/" source="CVE"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2019-17023" ref_url="https://www.suse.com/security/cve/CVE-2019-17023/" source="CVE"/>
		<reference ref_id="CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400/" source="CVE"/>
		<reference ref_id="CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401/" source="CVE"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403/" source="CVE"/>
		<reference ref_id="CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4076.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4076.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11719">CVE-2019-11719 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11727">CVE-2019-11727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11756/">CVE-2019-11756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11756">CVE-2019-11756 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-17023/">CVE-2019-17023 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17023">CVE-2019-17023 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828558" comment="nspr-4.25.0-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828559" comment="nspr-devel-4.25.0-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828560" comment="nss-3.53.1-3.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828561" comment="nss-devel-3.53.1-3.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828562" comment="nss-pkcs11-devel-3.53.1-3.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828563" comment="nss-softokn-3.53.1-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828564" comment="nss-softokn-devel-3.53.1-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828565" comment="nss-softokn-freebl-3.53.1-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828566" comment="nss-softokn-freebl-devel-3.53.1-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828567" comment="nss-sysinit-3.53.1-3.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828568" comment="nss-tools-3.53.1-3.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828569" comment="nss-util-3.53.1-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828570" comment="nss-util-devel-3.53.1-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1023" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4079.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4079.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828571" comment="qemu-img-1.5.3-175.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828572" comment="qemu-kvm-1.5.3-175.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828573" comment="qemu-kvm-common-1.5.3-175.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828574" comment="qemu-kvm-tools-1.5.3-175.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1024" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-15648" ref_url="https://www.suse.com/security/cve/CVE-2020-15648/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4080.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4080.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12422">CVE-2020-12422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12424">CVE-2020-12424 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12425">CVE-2020-12425 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15648/">CVE-2020-15648 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15648">CVE-2020-15648 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15653">CVE-2020-15653 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15654">CVE-2020-15654 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15656">CVE-2020-15656 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15658">CVE-2020-15658 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828575" comment="firefox-78.3.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1025" version="1" class="patch">
	<metadata>
		<title>security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4082.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4082.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12528">CVE-2019-12528 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15049">CVE-2020-15049 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15810">CVE-2020-15810 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15811">CVE-2020-15811 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24606">CVE-2020-24606 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8449">CVE-2020-8449 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8450">CVE-2020-8450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828576" comment="squid-3.5.20-17.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828577" comment="squid-migration-script-3.5.20-17.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828578" comment="squid-sysvinit-3.5.20-17.el7_9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1026" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4163.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4163.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15673">CVE-2020-15673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15676">CVE-2020-15676 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15677">CVE-2020-15677 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15678">CVE-2020-15678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828579" comment="thunderbird-78.3.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1027" version="1" class="patch">
	<metadata>
		<title>security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4187.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4187.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828580" comment="spice-glib-0.35-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828581" comment="spice-glib-devel-0.35-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828582" comment="spice-gtk-tools-0.35-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828583" comment="spice-gtk3-0.35-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828584" comment="spice-gtk3-devel-0.35-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828585" comment="spice-gtk3-vala-0.35-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828586" comment="spice-server-0.14.0-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828587" comment="spice-server-devel-0.14.0-9.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828580" comment="spice-glib-0.35-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828581" comment="spice-glib-devel-0.35-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828582" comment="spice-gtk-tools-0.35-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828583" comment="spice-gtk3-0.35-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828584" comment="spice-gtk3-devel-0.35-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828585" comment="spice-gtk3-vala-0.35-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828586" comment="spice-server-0.14.0-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828587" comment="spice-server-devel-0.14.0-9.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1028" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4307.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4307.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828588" comment="java-11-openjdk-11.0.9.11-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828589" comment="java-11-openjdk-demo-11.0.9.11-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828590" comment="java-11-openjdk-devel-11.0.9.11-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828591" comment="java-11-openjdk-headless-11.0.9.11-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828592" comment="java-11-openjdk-javadoc-11.0.9.11-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828593" comment="java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828594" comment="java-11-openjdk-jmods-11.0.9.11-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828595" comment="java-11-openjdk-src-11.0.9.11-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828596" comment="java-11-openjdk-static-libs-11.0.9.11-0.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1029" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4310.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4310.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828597" comment="firefox-78.4.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1030" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4350.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4350.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14779">CVE-2020-14779 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14781">CVE-2020-14781 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14782">CVE-2020-14782 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14792">CVE-2020-14792 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14796">CVE-2020-14796 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14797">CVE-2020-14797 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14803">CVE-2020-14803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828598" comment="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828599" comment="java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828600" comment="java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828601" comment="java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828602" comment="java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828603" comment="java-1.8.0-openjdk-javadoc-1.8.0.272.b10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828604" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.272.b10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828605" comment="java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1031" version="1" class="patch">
	<metadata>
		<title>security update for freetype (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4907.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4907.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828606" comment="freetype-2.8-14.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828607" comment="freetype-demos-2.8-14.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828608" comment="freetype-devel-2.8-14.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828606" comment="freetype-2.8-14.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828607" comment="freetype-demos-2.8-14.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828608" comment="freetype-devel-2.8-14.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1032" version="1" class="patch">
	<metadata>
		<title>security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4908.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4908.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14363">CVE-2020-14363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828609" comment="libX11-1.6.7-3.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828610" comment="libX11-common-1.6.7-3.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828611" comment="libX11-devel-1.6.7-3.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1033" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4909.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4909.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15683">CVE-2020-15683 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15969">CVE-2020-15969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828612" comment="thunderbird-78.4.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1034" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:4910.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:4910.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14345">CVE-2020-14345 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14346">CVE-2020-14346 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14361">CVE-2020-14361 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14362">CVE-2020-14362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828613" comment="xorg-x11-server-Xdmx-1.20.4-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828614" comment="xorg-x11-server-Xephyr-1.20.4-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828615" comment="xorg-x11-server-Xnest-1.20.4-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828616" comment="xorg-x11-server-Xorg-1.20.4-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828617" comment="xorg-x11-server-Xvfb-1.20.4-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828618" comment="xorg-x11-server-Xwayland-1.20.4-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828619" comment="xorg-x11-server-common-1.20.4-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828620" comment="xorg-x11-server-devel-1.20.4-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828621" comment="xorg-x11-server-source-1.20.4-12.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1035" version="1" class="patch">
	<metadata>
		<title>security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5002.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5002.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828622" comment="curl-7.29.0-59.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828623" comment="libcurl-7.29.0-59.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828624" comment="libcurl-devel-7.29.0-59.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1036" version="1" class="patch">
	<metadata>
		<title>security update for fence-agents (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5003.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5003.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11078">CVE-2020-11078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828625" comment="fence-agents-aliyun-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828626" comment="fence-agents-all-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828627" comment="fence-agents-amt-ws-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828628" comment="fence-agents-apc-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828629" comment="fence-agents-apc-snmp-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828630" comment="fence-agents-aws-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828631" comment="fence-agents-azure-arm-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828632" comment="fence-agents-bladecenter-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828633" comment="fence-agents-brocade-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828634" comment="fence-agents-cisco-mds-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828635" comment="fence-agents-cisco-ucs-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828636" comment="fence-agents-common-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828637" comment="fence-agents-compute-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828638" comment="fence-agents-drac5-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828639" comment="fence-agents-eaton-snmp-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828640" comment="fence-agents-emerson-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828641" comment="fence-agents-eps-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828642" comment="fence-agents-gce-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828643" comment="fence-agents-heuristics-ping-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828644" comment="fence-agents-hpblade-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828645" comment="fence-agents-ibmblade-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828646" comment="fence-agents-ifmib-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828647" comment="fence-agents-ilo-moonshot-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828648" comment="fence-agents-ilo-mp-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828649" comment="fence-agents-ilo-ssh-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828650" comment="fence-agents-ilo2-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828651" comment="fence-agents-intelmodular-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828652" comment="fence-agents-ipdu-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828653" comment="fence-agents-ipmilan-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828654" comment="fence-agents-kdump-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828655" comment="fence-agents-lpar-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828656" comment="fence-agents-mpath-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828657" comment="fence-agents-redfish-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828658" comment="fence-agents-rhevm-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828659" comment="fence-agents-rsa-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828660" comment="fence-agents-rsb-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828661" comment="fence-agents-sbd-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828662" comment="fence-agents-scsi-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828663" comment="fence-agents-virsh-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828664" comment="fence-agents-vmware-rest-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828665" comment="fence-agents-vmware-soap-4.2.1-41.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828666" comment="fence-agents-wti-4.2.1-41.el7_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1037" version="1" class="patch">
	<metadata>
		<title>security update for resource-agents (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5004.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5004.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11078">CVE-2020-11078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828667" comment="resource-agents-4.1.1-61.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828668" comment="resource-agents-aliyun-4.1.1-61.el7_9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1038" version="1" class="patch">
	<metadata>
		<title>security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5009.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5009.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828669" comment="python-2.7.5-90.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828670" comment="python-debug-2.7.5-90.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828671" comment="python-devel-2.7.5-90.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828672" comment="python-libs-2.7.5-90.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828673" comment="python-test-2.7.5-90.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828674" comment="python-tools-2.7.5-90.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828675" comment="tkinter-2.7.5-90.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1039" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5010.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5010.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828676" comment="python3-3.6.8-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828677" comment="python3-debug-3.6.8-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828678" comment="python3-devel-3.6.8-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828679" comment="python3-idle-3.6.8-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828680" comment="python3-libs-3.6.8-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828681" comment="python3-test-3.6.8-18.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828682" comment="python3-tkinter-3.6.8-18.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1040" version="1" class="patch">
	<metadata>
		<title>security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622/" source="CVE"/>
		<reference ref_id="CVE-2020-8623" ref_url="https://www.suse.com/security/cve/CVE-2020-8623/" source="CVE"/>
		<reference ref_id="CVE-2020-8624" ref_url="https://www.suse.com/security/cve/CVE-2020-8624/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5011.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5011.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8622">CVE-2020-8622 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8623/">CVE-2020-8623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8623">CVE-2020-8623 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8624/">CVE-2020-8624 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8624">CVE-2020-8624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828683" comment="bind-9.11.4-26.P2.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828684" comment="bind-chroot-9.11.4-26.P2.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828685" comment="bind-devel-9.11.4-26.P2.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828686" comment="bind-export-devel-9.11.4-26.P2.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828687" comment="bind-export-libs-9.11.4-26.P2.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828688" comment="bind-libs-9.11.4-26.P2.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828689" comment="bind-libs-lite-9.11.4-26.P2.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828690" comment="bind-license-9.11.4-26.P2.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828691" comment="bind-lite-devel-9.11.4-26.P2.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828692" comment="bind-pkcs11-9.11.4-26.P2.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828693" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828694" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828695" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828696" comment="bind-sdb-9.11.4-26.P2.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828697" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828698" comment="bind-utils-9.11.4-26.P2.el7_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1041" version="1" class="patch">
	<metadata>
		<title>security update for librepo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-14352" ref_url="https://www.suse.com/security/cve/CVE-2020-14352/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5012.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5012.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14352/">CVE-2020-14352 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14352">CVE-2020-14352 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828699" comment="librepo-1.8.1-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828700" comment="librepo-devel-1.8.1-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828701" comment="python-librepo-1.8.1-8.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1042" version="1" class="patch">
	<metadata>
		<title>security update for tomcat (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5020.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5020.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1935">CVE-2020-1935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828702" comment="tomcat-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828703" comment="tomcat-admin-webapps-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828704" comment="tomcat-docs-webapp-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828705" comment="tomcat-el-2.2-api-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828706" comment="tomcat-javadoc-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828707" comment="tomcat-jsp-2.2-api-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828708" comment="tomcat-jsvc-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828709" comment="tomcat-lib-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828710" comment="tomcat-servlet-3.0-api-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828711" comment="tomcat-webapps-7.0.76-16.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828702" comment="tomcat-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828703" comment="tomcat-admin-webapps-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828704" comment="tomcat-docs-webapp-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828705" comment="tomcat-el-2.2-api-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828706" comment="tomcat-javadoc-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828707" comment="tomcat-jsp-2.2-api-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828708" comment="tomcat-jsvc-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828709" comment="tomcat-lib-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828710" comment="tomcat-servlet-3.0-api-7.0.76-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828711" comment="tomcat-webapps-7.0.76-16.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1043" version="1" class="patch">
	<metadata>
		<title>security update for qt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5021.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5021.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17507">CVE-2020-17507 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828712" comment="qt-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828713" comment="qt-assistant-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828714" comment="qt-config-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828715" comment="qt-demos-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828716" comment="qt-devel-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828717" comment="qt-devel-private-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828718" comment="qt-doc-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828719" comment="qt-examples-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828720" comment="qt-mysql-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828721" comment="qt-odbc-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828722" comment="qt-postgresql-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828723" comment="qt-qdbusviewer-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828724" comment="qt-qvfb-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828725" comment="qt-x11-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828726" comment="qt5-qtbase-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828727" comment="qt5-qtbase-common-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828728" comment="qt5-qtbase-devel-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828729" comment="qt5-qtbase-doc-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828730" comment="qt5-qtbase-examples-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828731" comment="qt5-qtbase-gui-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828732" comment="qt5-qtbase-mysql-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828733" comment="qt5-qtbase-odbc-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828734" comment="qt5-qtbase-postgresql-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828735" comment="qt5-qtbase-static-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828736" comment="qt5-rpm-macros-5.9.7-5.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828712" comment="qt-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828713" comment="qt-assistant-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828714" comment="qt-config-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828715" comment="qt-demos-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828716" comment="qt-devel-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828717" comment="qt-devel-private-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828718" comment="qt-doc-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828719" comment="qt-examples-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828720" comment="qt-mysql-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828721" comment="qt-odbc-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828722" comment="qt-postgresql-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828723" comment="qt-qdbusviewer-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828724" comment="qt-qvfb-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828725" comment="qt-x11-4.8.7-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828726" comment="qt5-qtbase-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828727" comment="qt5-qtbase-common-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828728" comment="qt5-qtbase-devel-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828729" comment="qt5-qtbase-doc-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828730" comment="qt5-qtbase-examples-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828731" comment="qt5-qtbase-gui-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828732" comment="qt5-qtbase-mysql-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828733" comment="qt5-qtbase-odbc-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828734" comment="qt5-qtbase-postgresql-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828735" comment="qt5-qtbase-static-5.9.7-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828736" comment="qt5-rpm-macros-5.9.7-5.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1044" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-20811" ref_url="https://www.suse.com/security/cve/CVE-2019-20811/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5023.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5023.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20811/">CVE-2019-20811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20811">CVE-2019-20811 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828737" comment="bpftool-3.10.0-1160.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828738" comment="kernel-3.10.0-1160.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828739" comment="kernel-abi-whitelists-3.10.0-1160.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828740" comment="kernel-debug-3.10.0-1160.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828743" comment="kernel-doc-3.10.0-1160.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828744" comment="kernel-headers-3.10.0-1160.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828745" comment="kernel-tools-3.10.0-1160.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828746" comment="kernel-tools-libs-3.10.0-1160.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828748" comment="perf-3.10.0-1160.6.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828749" comment="python-perf-3.10.0-1160.6.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1045" version="1" class="patch">
	<metadata>
		<title>security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5040.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5040.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25637">CVE-2020-25637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828750" comment="libvirt-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828751" comment="libvirt-admin-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828752" comment="libvirt-bash-completion-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828753" comment="libvirt-client-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828754" comment="libvirt-daemon-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828755" comment="libvirt-daemon-config-network-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828756" comment="libvirt-daemon-config-nwfilter-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828757" comment="libvirt-daemon-driver-interface-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828758" comment="libvirt-daemon-driver-lxc-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828759" comment="libvirt-daemon-driver-network-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828760" comment="libvirt-daemon-driver-nodedev-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828761" comment="libvirt-daemon-driver-nwfilter-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828762" comment="libvirt-daemon-driver-qemu-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828763" comment="libvirt-daemon-driver-secret-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828764" comment="libvirt-daemon-driver-storage-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828765" comment="libvirt-daemon-driver-storage-core-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828766" comment="libvirt-daemon-driver-storage-disk-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828767" comment="libvirt-daemon-driver-storage-gluster-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828768" comment="libvirt-daemon-driver-storage-iscsi-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828769" comment="libvirt-daemon-driver-storage-logical-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828770" comment="libvirt-daemon-driver-storage-mpath-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828771" comment="libvirt-daemon-driver-storage-rbd-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828772" comment="libvirt-daemon-driver-storage-scsi-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828773" comment="libvirt-daemon-kvm-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828774" comment="libvirt-daemon-lxc-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828775" comment="libvirt-devel-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828776" comment="libvirt-docs-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828777" comment="libvirt-libs-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828778" comment="libvirt-lock-sanlock-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828779" comment="libvirt-login-shell-4.5.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828780" comment="libvirt-nss-4.5.0-36.el7_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1046" version="1" class="patch">
	<metadata>
		<title>security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5083.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5083.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828781" comment="microcode_ctl-2.1-73.2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1047" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5099.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5099.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828782" comment="firefox-78.4.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1048" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5163.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5163.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26950">CVE-2020-26950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828783" comment="thunderbird-78.4.3-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1049" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5235.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5235.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828784" comment="thunderbird-78.5.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1050" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5239.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5239.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16012">CVE-2020-16012 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26951">CVE-2020-26951 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26953">CVE-2020-26953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26956">CVE-2020-26956 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26958">CVE-2020-26958 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26959">CVE-2020-26959 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26960">CVE-2020-26960 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26961">CVE-2020-26961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26965">CVE-2020-26965 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26968">CVE-2020-26968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828785" comment="firefox-78.5.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1051" version="1" class="patch">
	<metadata>
		<title>security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5350.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5350.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15862">CVE-2020-15862 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828786" comment="net-snmp-5.7.2-49.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828787" comment="net-snmp-agent-libs-5.7.2-49.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828788" comment="net-snmp-devel-5.7.2-49.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828789" comment="net-snmp-gui-5.7.2-49.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828790" comment="net-snmp-libs-5.7.2-49.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828791" comment="net-snmp-perl-5.7.2-49.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828792" comment="net-snmp-python-5.7.2-49.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828793" comment="net-snmp-sysvinit-5.7.2-49.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828794" comment="net-snmp-utils-5.7.2-49.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1052" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-26970" ref_url="https://www.suse.com/security/cve/CVE-2020-26970/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5400.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5400.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-26970/">CVE-2020-26970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26970">CVE-2020-26970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828795" comment="thunderbird-78.5.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1053" version="1" class="patch">
	<metadata>
		<title>security update for libexif (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5402.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5402.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0452">CVE-2020-0452 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828796" comment="libexif-0.6.22-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828797" comment="libexif-devel-0.6.22-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828798" comment="libexif-doc-0.6.22-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828796" comment="libexif-0.6.22-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828797" comment="libexif-devel-0.6.22-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828798" comment="libexif-doc-0.6.22-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1054" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5408.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5408.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14347">CVE-2020-14347 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14360">CVE-2020-14360 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25712">CVE-2020-25712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828799" comment="xorg-x11-server-Xdmx-1.20.4-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828800" comment="xorg-x11-server-Xephyr-1.20.4-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828801" comment="xorg-x11-server-Xnest-1.20.4-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828802" comment="xorg-x11-server-Xorg-1.20.4-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828803" comment="xorg-x11-server-Xvfb-1.20.4-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828804" comment="xorg-x11-server-Xwayland-1.20.4-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828805" comment="xorg-x11-server-common-1.20.4-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828806" comment="xorg-x11-server-devel-1.20.4-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828807" comment="xorg-x11-server-source-1.20.4-15.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1055" version="1" class="patch">
	<metadata>
		<title>security update for targetcli (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-13867" ref_url="https://www.suse.com/security/cve/CVE-2020-13867/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5434.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5434.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13867/">CVE-2020-13867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13867">CVE-2020-13867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828808" comment="targetcli-2.1.53-1.el7_9 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828808" comment="targetcli-2.1.53-1.el7_9 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1056" version="1" class="patch">
	<metadata>
		<title>security update for python-rtslib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-14019" ref_url="https://www.suse.com/security/cve/CVE-2020-14019/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5435.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5435.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14019/">CVE-2020-14019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14019">CVE-2020-14019 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828809" comment="python-rtslib-2.1.74-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828810" comment="python-rtslib-doc-2.1.74-1.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828809" comment="python-rtslib-2.1.74-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828810" comment="python-rtslib-doc-2.1.74-1.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1057" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-18282" ref_url="https://www.suse.com/security/cve/CVE-2019-18282/" source="CVE"/>
		<reference ref_id="CVE-2020-10769" ref_url="https://www.suse.com/security/cve/CVE-2020-10769/" source="CVE"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14385" ref_url="https://www.suse.com/security/cve/CVE-2020-14385/" source="CVE"/>
		<reference ref_id="CVE-2020-24394" ref_url="https://www.suse.com/security/cve/CVE-2020-24394/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5437.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5437.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18282/">CVE-2019-18282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18282">CVE-2019-18282 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10769/">CVE-2020-10769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10769">CVE-2020-10769 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14314">CVE-2020-14314 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14385/">CVE-2020-14385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14385">CVE-2020-14385 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24394/">CVE-2020-24394 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24394">CVE-2020-24394 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828811" comment="bpftool-3.10.0-1160.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828812" comment="kernel-3.10.0-1160.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828813" comment="kernel-abi-whitelists-3.10.0-1160.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828814" comment="kernel-debug-3.10.0-1160.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828817" comment="kernel-doc-3.10.0-1160.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828818" comment="kernel-headers-3.10.0-1160.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828819" comment="kernel-tools-3.10.0-1160.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828820" comment="kernel-tools-libs-3.10.0-1160.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828822" comment="perf-3.10.0-1160.11.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828823" comment="python-perf-3.10.0-1160.11.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1058" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5439.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5439.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14318">CVE-2020-14318 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14323">CVE-2020-14323 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">CVE-2020-1472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828824" comment="ctdb-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828825" comment="ctdb-tests-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828826" comment="libsmbclient-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828827" comment="libsmbclient-devel-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828828" comment="libwbclient-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828829" comment="libwbclient-devel-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828830" comment="samba-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828831" comment="samba-client-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828832" comment="samba-client-libs-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828833" comment="samba-common-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828834" comment="samba-common-libs-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828835" comment="samba-common-tools-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828836" comment="samba-dc-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828837" comment="samba-dc-libs-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828838" comment="samba-devel-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828839" comment="samba-krb5-printing-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828840" comment="samba-libs-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828841" comment="samba-pidl-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828842" comment="samba-python-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828843" comment="samba-python-test-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828844" comment="samba-test-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828845" comment="samba-test-libs-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828846" comment="samba-vfs-glusterfs-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828847" comment="samba-winbind-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828848" comment="samba-winbind-clients-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828849" comment="samba-winbind-krb5-locator-4.10.16-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828850" comment="samba-winbind-modules-4.10.16-9.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1059" version="1" class="patch">
	<metadata>
		<title>security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5443.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5443.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5766">CVE-2016-5766 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828851" comment="gd-2.0.35-27.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828852" comment="gd-devel-2.0.35-27.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828853" comment="gd-progs-2.0.35-27.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828851" comment="gd-2.0.35-27.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828852" comment="gd-devel-2.0.35-27.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828853" comment="gd-progs-2.0.35-27.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1060" version="1" class="patch">
	<metadata>
		<title>security update for pacemaker (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-25654" ref_url="https://www.suse.com/security/cve/CVE-2020-25654/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5453.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5453.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25654/">CVE-2020-25654 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25654">CVE-2020-25654 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828854" comment="pacemaker-1.1.23-1.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828855" comment="pacemaker-cli-1.1.23-1.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828856" comment="pacemaker-cluster-libs-1.1.23-1.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828857" comment="pacemaker-cts-1.1.23-1.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828858" comment="pacemaker-doc-1.1.23-1.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828859" comment="pacemaker-libs-1.1.23-1.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828860" comment="pacemaker-libs-devel-1.1.23-1.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828861" comment="pacemaker-nagios-plugins-metadata-1.1.23-1.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828862" comment="pacemaker-remote-1.1.23-1.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1061" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5561.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5561.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828863" comment="firefox-78.6.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1062" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5566.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5566.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828864" comment="openssl-1.0.2k-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828865" comment="openssl-devel-1.0.2k-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828866" comment="openssl-libs-1.0.2k-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828867" comment="openssl-perl-1.0.2k-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828868" comment="openssl-static-1.0.2k-21.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1063" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2020:5618.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2020:5618.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16042">CVE-2020-16042 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26971">CVE-2020-26971 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26973">CVE-2020-26973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26974">CVE-2020-26974 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26978">CVE-2020-26978 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35111">CVE-2020-35111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35113">CVE-2020-35113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828869" comment="thunderbird-78.6.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1064" version="1" class="patch">
	<metadata>
		<title>security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-29599" ref_url="https://www.suse.com/security/cve/CVE-2020-29599/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0024.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0024.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29599/">CVE-2020-29599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29599">CVE-2020-29599 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828870" comment="ImageMagick-6.9.10.68-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828871" comment="ImageMagick-c++-6.9.10.68-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828872" comment="ImageMagick-c++-devel-6.9.10.68-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828873" comment="ImageMagick-devel-6.9.10.68-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828874" comment="ImageMagick-doc-6.9.10.68-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828875" comment="ImageMagick-perl-6.9.10.68-5.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1065" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0053.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0053.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828876" comment="firefox-78.6.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1066" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0087.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0087.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16044">CVE-2020-16044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828877" comment="thunderbird-78.6.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1067" version="1" class="patch">
	<metadata>
		<title>security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0153.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0153.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25684">CVE-2020-25684 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25685">CVE-2020-25685 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25686">CVE-2020-25686 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828878" comment="dnsmasq-2.76-16.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828879" comment="dnsmasq-utils-2.76-16.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1068" version="1" class="patch">
	<metadata>
		<title>security update for xstream (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-26217" ref_url="https://www.suse.com/security/cve/CVE-2020-26217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0162.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0162.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26217/">CVE-2020-26217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26217">CVE-2020-26217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828880" comment="xstream-1.3.1-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828881" comment="xstream-javadoc-1.3.1-12.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1069" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0221.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0221.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828882" comment="sudo-1.8.23-10.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828883" comment="sudo-devel-1.8.23-10.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1070" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0290.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0290.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828884" comment="firefox-78.7.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1071" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-15685" ref_url="https://www.suse.com/security/cve/CVE-2020-15685/" source="CVE"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0297.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0297.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15685/">CVE-2020-15685 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15685">CVE-2020-15685 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26976">CVE-2020-26976 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23953">CVE-2021-23953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23954">CVE-2021-23954 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23960">CVE-2021-23960 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23964">CVE-2021-23964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828885" comment="thunderbird-78.7.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1072" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-35513" ref_url="https://www.suse.com/security/cve/CVE-2020-35513/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0336.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0336.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15436">CVE-2020-15436 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35513/">CVE-2020-35513 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35513">CVE-2020-35513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828886" comment="bpftool-3.10.0-1160.15.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828887" comment="kernel-3.10.0-1160.15.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828888" comment="kernel-abi-whitelists-3.10.0-1160.15.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828889" comment="kernel-debug-3.10.0-1160.15.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828892" comment="kernel-doc-3.10.0-1160.15.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828893" comment="kernel-headers-3.10.0-1160.15.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828894" comment="kernel-tools-3.10.0-1160.15.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828895" comment="kernel-tools-libs-3.10.0-1160.15.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828897" comment="perf-3.10.0-1160.15.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828898" comment="python-perf-3.10.0-1160.15.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1073" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0339.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0339.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12321">CVE-2020-12321 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828899" comment="iwl100-firmware-39.31.5.1-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828900" comment="iwl1000-firmware-39.31.5.1-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828901" comment="iwl105-firmware-18.168.6.1-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828902" comment="iwl135-firmware-18.168.6.1-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828903" comment="iwl2000-firmware-18.168.6.1-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828904" comment="iwl2030-firmware-18.168.6.1-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828905" comment="iwl3160-firmware-25.30.13.0-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828906" comment="iwl3945-firmware-15.32.2.9-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828907" comment="iwl4965-firmware-228.61.2.24-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828908" comment="iwl5000-firmware-8.83.5.1_1-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828909" comment="iwl5150-firmware-8.24.2.2-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828910" comment="iwl6000-firmware-9.221.4.1-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828911" comment="iwl6000g2a-firmware-18.168.6.1-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828912" comment="iwl6000g2b-firmware-18.168.6.1-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828913" comment="iwl6050-firmware-41.28.5.1-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828914" comment="iwl7260-firmware-25.30.13.0-80.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828915" comment="linux-firmware-20200421-80.git78c0348.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1074" version="1" class="patch">
	<metadata>
		<title>security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0343.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0343.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10543">CVE-2020-10543 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12723">CVE-2020-12723 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828916" comment="perl-5.16.3-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828917" comment="perl-CPAN-1.9800-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828918" comment="perl-ExtUtils-CBuilder-0.28.2.6-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828919" comment="perl-ExtUtils-Embed-1.30-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828920" comment="perl-ExtUtils-Install-1.58-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828921" comment="perl-IO-Zlib-1.10-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828922" comment="perl-Locale-Maketext-Simple-0.21-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828923" comment="perl-Module-CoreList-2.76.02-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828924" comment="perl-Module-Loaded-0.08-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828925" comment="perl-Object-Accessor-0.42-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828926" comment="perl-Package-Constants-0.02-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828927" comment="perl-Pod-Escapes-1.04-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828928" comment="perl-Time-Piece-1.20.1-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828929" comment="perl-core-5.16.3-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828930" comment="perl-devel-5.16.3-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828931" comment="perl-libs-5.16.3-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828932" comment="perl-macros-5.16.3-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828933" comment="perl-tests-5.16.3-299.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828916" comment="perl-5.16.3-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828917" comment="perl-CPAN-1.9800-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828918" comment="perl-ExtUtils-CBuilder-0.28.2.6-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828919" comment="perl-ExtUtils-Embed-1.30-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828920" comment="perl-ExtUtils-Install-1.58-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828921" comment="perl-IO-Zlib-1.10-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828922" comment="perl-Locale-Maketext-Simple-0.21-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828923" comment="perl-Module-CoreList-2.76.02-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828924" comment="perl-Module-Loaded-0.08-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828925" comment="perl-Object-Accessor-0.42-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828926" comment="perl-Package-Constants-0.02-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828927" comment="perl-Pod-Escapes-1.04-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828928" comment="perl-Time-Piece-1.20.1-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828929" comment="perl-core-5.16.3-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828930" comment="perl-devel-5.16.3-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828931" comment="perl-libs-5.16.3-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828932" comment="perl-macros-5.16.3-299.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828933" comment="perl-tests-5.16.3-299.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1075" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-13765" ref_url="https://www.suse.com/security/cve/CVE-2020-13765/" source="CVE"/>
		<reference ref_id="CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0347.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0347.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13765/">CVE-2020-13765 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13765">CVE-2020-13765 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16092">CVE-2020-16092 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828934" comment="qemu-img-1.5.3-175.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828935" comment="qemu-kvm-1.5.3-175.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828936" comment="qemu-kvm-common-1.5.3-175.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828937" comment="qemu-kvm-tools-1.5.3-175.el7_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1076" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-25013" ref_url="https://www.suse.com/security/cve/CVE-2019-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<reference ref_id="CVE-2020-29573" ref_url="https://www.suse.com/security/cve/CVE-2020-29573/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0348.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0348.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-25013/">CVE-2019-25013 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25013">CVE-2019-25013 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">CVE-2020-10029 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29573/">CVE-2020-29573 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29573">CVE-2020-29573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828938" comment="glibc-2.17-322.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828939" comment="glibc-common-2.17-322.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828940" comment="glibc-devel-2.17-322.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828941" comment="glibc-headers-2.17-322.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828942" comment="glibc-static-2.17-322.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828943" comment="glibc-utils-2.17-322.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828944" comment="nscd-2.17-322.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1077" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-21261" ref_url="https://www.suse.com/security/cve/CVE-2021-21261/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0411.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0411.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21261/">CVE-2021-21261 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21261">CVE-2021-21261 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828945" comment="flatpak-1.0.9-10.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828946" comment="flatpak-builder-1.0.0-10.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828947" comment="flatpak-devel-1.0.9-10.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828948" comment="flatpak-libs-1.0.9-10.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1078" version="1" class="patch">
	<metadata>
		<title>security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0617.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0617.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27135">CVE-2021-27135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828949" comment="xterm-295-3.el7_9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828949" comment="xterm-295-3.el7_9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1079" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0656.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0656.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828950" comment="firefox-78.8.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1080" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0661.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0661.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23968">CVE-2021-23968 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23969">CVE-2021-23969 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23973">CVE-2021-23973 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23978">CVE-2021-23978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828951" comment="thunderbird-78.8.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1081" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0671.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0671.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8625">CVE-2020-8625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828952" comment="bind-9.11.4-26.P2.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828953" comment="bind-chroot-9.11.4-26.P2.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828954" comment="bind-devel-9.11.4-26.P2.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828955" comment="bind-export-devel-9.11.4-26.P2.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828956" comment="bind-export-libs-9.11.4-26.P2.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828957" comment="bind-libs-9.11.4-26.P2.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828958" comment="bind-libs-lite-9.11.4-26.P2.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828959" comment="bind-license-9.11.4-26.P2.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828960" comment="bind-lite-devel-9.11.4-26.P2.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828961" comment="bind-pkcs11-9.11.4-26.P2.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828962" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828963" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828964" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828965" comment="bind-sdb-9.11.4-26.P2.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828966" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828967" comment="bind-utils-9.11.4-26.P2.el7_9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1082" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0699.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0699.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14372">CVE-2020-14372 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25632">CVE-2020-25632 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25647">CVE-2020-25647 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27749">CVE-2020-27749 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27779">CVE-2020-27779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20225">CVE-2021-20225 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20233">CVE-2021-20233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828968" comment="grub2-2.02-0.87.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828969" comment="grub2-common-2.02-0.87.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828970" comment="grub2-efi-ia32-2.02-0.87.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828971" comment="grub2-efi-ia32-cdboot-2.02-0.87.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828972" comment="grub2-efi-ia32-modules-2.02-0.87.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828973" comment="grub2-efi-x64-2.02-0.87.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828974" comment="grub2-efi-x64-cdboot-2.02-0.87.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828975" comment="grub2-efi-x64-modules-2.02-0.87.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828976" comment="grub2-pc-2.02-0.87.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828977" comment="grub2-pc-modules-2.02-0.87.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828978" comment="grub2-tools-2.02-0.87.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828979" comment="grub2-tools-extra-2.02-0.87.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828980" comment="grub2-tools-minimal-2.02-0.87.el7_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1083" version="1" class="patch">
	<metadata>
		<title>security update for screen (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0742.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0742.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26937">CVE-2021-26937 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828981" comment="screen-4.1.0-0.27.20120314git3c2946.el7_9 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828981" comment="screen-4.1.0-0.27.20120314git3c2946.el7_9 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1084" version="1" class="patch">
	<metadata>
		<title>security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0808.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0808.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27803">CVE-2021-27803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828982" comment="wpa_supplicant-2.6-12.el7_9.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828982" comment="wpa_supplicant-2.6-12.el7_9.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1085" version="1" class="patch">
	<metadata>
		<title>security update for pki-core (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-10146" ref_url="https://www.suse.com/security/cve/CVE-2019-10146/" source="CVE"/>
		<reference ref_id="CVE-2019-10179" ref_url="https://www.suse.com/security/cve/CVE-2019-10179/" source="CVE"/>
		<reference ref_id="CVE-2019-10221" ref_url="https://www.suse.com/security/cve/CVE-2019-10221/" source="CVE"/>
		<reference ref_id="CVE-2020-1721" ref_url="https://www.suse.com/security/cve/CVE-2020-1721/" source="CVE"/>
		<reference ref_id="CVE-2020-25715" ref_url="https://www.suse.com/security/cve/CVE-2020-25715/" source="CVE"/>
		<reference ref_id="CVE-2021-20179" ref_url="https://www.suse.com/security/cve/CVE-2021-20179/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0851.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0851.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10146/">CVE-2019-10146 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10146">CVE-2019-10146 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10179/">CVE-2019-10179 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10179">CVE-2019-10179 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10221/">CVE-2019-10221 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10221">CVE-2019-10221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1721/">CVE-2020-1721 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1721">CVE-2020-1721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-25715/">CVE-2020-25715 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25715">CVE-2020-25715 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-20179/">CVE-2021-20179 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20179">CVE-2021-20179 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828983" comment="pki-base-10.5.18-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828984" comment="pki-base-java-10.5.18-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828985" comment="pki-ca-10.5.18-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828986" comment="pki-javadoc-10.5.18-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828987" comment="pki-kra-10.5.18-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828988" comment="pki-server-10.5.18-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828989" comment="pki-symkey-10.5.18-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828990" comment="pki-tools-10.5.18-12.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1086" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-7053" ref_url="https://www.suse.com/security/cve/CVE-2020-7053/" source="CVE"/>
		<reference ref_id="CVE-2021-20265" ref_url="https://www.suse.com/security/cve/CVE-2021-20265/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0856.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0856.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19532">CVE-2019-19532 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0427">CVE-2020-0427 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14351">CVE-2020-14351 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-7053/">CVE-2020-7053 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7053">CVE-2020-7053 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20265/">CVE-2021-20265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20265">CVE-2021-20265 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009828991" comment="bpftool-3.10.0-1160.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828992" comment="kernel-3.10.0-1160.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828993" comment="kernel-abi-whitelists-3.10.0-1160.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828994" comment="kernel-debug-3.10.0-1160.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828997" comment="kernel-doc-3.10.0-1160.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828998" comment="kernel-headers-3.10.0-1160.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009828999" comment="kernel-tools-3.10.0-1160.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829000" comment="kernel-tools-libs-3.10.0-1160.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829002" comment="perf-3.10.0-1160.21.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829003" comment="python-perf-3.10.0-1160.21.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1087" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0860.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0860.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829004" comment="ipa-client-4.6.8-5.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829005" comment="ipa-client-common-4.6.8-5.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829006" comment="ipa-common-4.6.8-5.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829007" comment="ipa-python-compat-4.6.8-5.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829008" comment="ipa-server-4.6.8-5.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829009" comment="ipa-server-common-4.6.8-5.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829010" comment="ipa-server-dns-4.6.8-5.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829011" comment="ipa-server-trust-ad-4.6.8-5.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829012" comment="python2-ipaclient-4.6.8-5.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829013" comment="python2-ipalib-4.6.8-5.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829014" comment="python2-ipaserver-4.6.8-5.el7_9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1088" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0992.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0992.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829015" comment="firefox-78.9.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1089" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:0996.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:0996.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829016" comment="thunderbird-78.9.0-3.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1090" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-21381" ref_url="https://www.suse.com/security/cve/CVE-2021-21381/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1002.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1002.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21381/">CVE-2021-21381 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21381">CVE-2021-21381 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829017" comment="flatpak-1.0.9-11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829018" comment="flatpak-builder-1.0.0-11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829019" comment="flatpak-devel-1.0.9-11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829020" comment="flatpak-libs-1.0.9-11.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1091" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1071.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1071.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829021" comment="bpftool-3.10.0-1160.24.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829022" comment="kernel-3.10.0-1160.24.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829023" comment="kernel-abi-whitelists-3.10.0-1160.24.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829024" comment="kernel-debug-3.10.0-1160.24.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829027" comment="kernel-doc-3.10.0-1160.24.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829028" comment="kernel-headers-3.10.0-1160.24.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829029" comment="kernel-tools-3.10.0-1160.24.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829030" comment="kernel-tools-libs-3.10.0-1160.24.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829032" comment="perf-3.10.0-1160.24.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829033" comment="python-perf-3.10.0-1160.24.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1092" version="1" class="patch">
	<metadata>
		<title>security update for libldb (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1072.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1072.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20277">CVE-2021-20277 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829034" comment="ldb-tools-1.5.4-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829035" comment="libldb-1.5.4-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829036" comment="libldb-devel-1.5.4-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829037" comment="pyldb-1.5.4-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829038" comment="pyldb-devel-1.5.4-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829034" comment="ldb-tools-1.5.4-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829035" comment="libldb-1.5.4-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829036" comment="libldb-devel-1.5.4-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829037" comment="pyldb-1.5.4-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829038" comment="pyldb-devel-1.5.4-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1093" version="1" class="patch">
	<metadata>
		<title>security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1135.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1135.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25097">CVE-2020-25097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829039" comment="squid-3.5.20-17.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829040" comment="squid-migration-script-3.5.20-17.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829041" comment="squid-sysvinit-3.5.20-17.el7_9.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1094" version="1" class="patch">
	<metadata>
		<title>security update for nettle (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1145.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1145.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829042" comment="nettle-2.7.1-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829043" comment="nettle-devel-2.7.1-9.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829042" comment="nettle-2.7.1-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829043" comment="nettle-devel-2.7.1-9.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1095" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-23991" ref_url="https://www.suse.com/security/cve/CVE-2021-23991/" source="CVE"/>
		<reference ref_id="CVE-2021-23992" ref_url="https://www.suse.com/security/cve/CVE-2021-23992/" source="CVE"/>
		<reference ref_id="CVE-2021-23993" ref_url="https://www.suse.com/security/cve/CVE-2021-23993/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1192.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1192.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23991/">CVE-2021-23991 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23991">CVE-2021-23991 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23992/">CVE-2021-23992 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23992">CVE-2021-23992 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23993/">CVE-2021-23993 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23993">CVE-2021-23993 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829044" comment="thunderbird-78.9.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1096" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1297.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1297.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829045" comment="java-11-openjdk-11.0.11.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829046" comment="java-11-openjdk-demo-11.0.11.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829047" comment="java-11-openjdk-devel-11.0.11.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829048" comment="java-11-openjdk-headless-11.0.11.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829049" comment="java-11-openjdk-javadoc-11.0.11.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829050" comment="java-11-openjdk-javadoc-zip-11.0.11.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829051" comment="java-11-openjdk-jmods-11.0.11.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829052" comment="java-11-openjdk-src-11.0.11.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829053" comment="java-11-openjdk-static-libs-11.0.11.0.9-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1097" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1298.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1298.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2163">CVE-2021-2163 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829054" comment="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829055" comment="java-1.8.0-openjdk-accessibility-1.8.0.292.b10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829056" comment="java-1.8.0-openjdk-demo-1.8.0.292.b10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829057" comment="java-1.8.0-openjdk-devel-1.8.0.292.b10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829058" comment="java-1.8.0-openjdk-headless-1.8.0.292.b10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829059" comment="java-1.8.0-openjdk-javadoc-1.8.0.292.b10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829060" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.292.b10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829061" comment="java-1.8.0-openjdk-src-1.8.0.292.b10-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1098" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="CVE-2021-29948" ref_url="https://www.suse.com/security/cve/CVE-2021-29948/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1350.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1350.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-29948/">CVE-2021-29948 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29948">CVE-2021-29948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829062" comment="thunderbird-78.10.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1099" version="1" class="patch">
	<metadata>
		<title>security update for xstream (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-21344" ref_url="https://www.suse.com/security/cve/CVE-2021-21344/" source="CVE"/>
		<reference ref_id="CVE-2021-21345" ref_url="https://www.suse.com/security/cve/CVE-2021-21345/" source="CVE"/>
		<reference ref_id="CVE-2021-21346" ref_url="https://www.suse.com/security/cve/CVE-2021-21346/" source="CVE"/>
		<reference ref_id="CVE-2021-21347" ref_url="https://www.suse.com/security/cve/CVE-2021-21347/" source="CVE"/>
		<reference ref_id="CVE-2021-21350" ref_url="https://www.suse.com/security/cve/CVE-2021-21350/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1354.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1354.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21344/">CVE-2021-21344 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21344">CVE-2021-21344 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21345/">CVE-2021-21345 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21345">CVE-2021-21345 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21346/">CVE-2021-21346 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21346">CVE-2021-21346 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21347/">CVE-2021-21347 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21347">CVE-2021-21347 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21350/">CVE-2021-21350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21350">CVE-2021-21350 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829063" comment="xstream-1.3.1-13.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829064" comment="xstream-javadoc-1.3.1-13.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1100" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1363.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1363.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23961">CVE-2021-23961 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23994">CVE-2021-23994 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23995">CVE-2021-23995 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23998">CVE-2021-23998 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23999">CVE-2021-23999 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24002">CVE-2021-24002 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29945">CVE-2021-29945 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29946">CVE-2021-29946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829065" comment="firefox-78.10.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1101" version="1" class="patch">
	<metadata>
		<title>security update for nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1384.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1384.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829066" comment="nss-3.53.1-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829067" comment="nss-devel-3.53.1-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829068" comment="nss-pkcs11-devel-3.53.1-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829069" comment="nss-sysinit-3.53.1-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829070" comment="nss-tools-3.53.1-7.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1102" version="1" class="patch">
	<metadata>
		<title>security update for openldap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1389.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1389.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25692">CVE-2020-25692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829071" comment="openldap-2.4.44-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829072" comment="openldap-clients-2.4.44-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829073" comment="openldap-devel-2.4.44-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829074" comment="openldap-servers-2.4.44-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829075" comment="openldap-servers-sql-2.4.44-23.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1103" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1469.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1469.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215">CVE-2021-25215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829076" comment="bind-9.11.4-26.P2.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829077" comment="bind-chroot-9.11.4-26.P2.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829078" comment="bind-devel-9.11.4-26.P2.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829079" comment="bind-export-devel-9.11.4-26.P2.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829080" comment="bind-export-libs-9.11.4-26.P2.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829081" comment="bind-libs-9.11.4-26.P2.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829082" comment="bind-libs-lite-9.11.4-26.P2.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829083" comment="bind-license-9.11.4-26.P2.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829084" comment="bind-lite-devel-9.11.4-26.P2.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829085" comment="bind-pkcs11-9.11.4-26.P2.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829086" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829087" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829088" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829089" comment="bind-sdb-9.11.4-26.P2.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829090" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829091" comment="bind-utils-9.11.4-26.P2.el7_9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1104" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:1512.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:1512.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-10208">CVE-2019-10208 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25694">CVE-2020-25694 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25695">CVE-2020-25695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829092" comment="postgresql-9.2.24-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829093" comment="postgresql-contrib-9.2.24-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829094" comment="postgresql-devel-9.2.24-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829095" comment="postgresql-docs-9.2.24-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829096" comment="postgresql-libs-9.2.24-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829097" comment="postgresql-plperl-9.2.24-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829098" comment="postgresql-plpython-9.2.24-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829099" comment="postgresql-pltcl-9.2.24-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829100" comment="postgresql-server-9.2.24-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829101" comment="postgresql-static-9.2.24-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829102" comment="postgresql-test-9.2.24-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829103" comment="postgresql-upgrade-9.2.24-6.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1105" version="1" class="patch">
	<metadata>
		<title>security update for slapi-nis (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-3480" ref_url="https://www.suse.com/security/cve/CVE-2021-3480/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2032.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2032.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3480/">CVE-2021-3480 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3480">CVE-2021-3480 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829104" comment="slapi-nis-0.56.5-4.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1106" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2033.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2033.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3472">CVE-2021-3472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829105" comment="xorg-x11-server-Xdmx-1.20.4-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829106" comment="xorg-x11-server-Xephyr-1.20.4-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829107" comment="xorg-x11-server-Xnest-1.20.4-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829108" comment="xorg-x11-server-Xorg-1.20.4-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829109" comment="xorg-x11-server-Xvfb-1.20.4-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829110" comment="xorg-x11-server-Xwayland-1.20.4-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829111" comment="xorg-x11-server-common-1.20.4-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829112" comment="xorg-x11-server-devel-1.20.4-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829113" comment="xorg-x11-server-source-1.20.4-16.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1107" version="1" class="patch">
	<metadata>
		<title>security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2147.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2147.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829114" comment="glib2-2.56.1-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829115" comment="glib2-devel-2.56.1-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829116" comment="glib2-doc-2.56.1-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829117" comment="glib2-fam-2.56.1-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829118" comment="glib2-static-2.56.1-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829119" comment="glib2-tests-2.56.1-9.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829114" comment="glib2-2.56.1-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829115" comment="glib2-devel-2.56.1-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829116" comment="glib2-doc-2.56.1-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829117" comment="glib2-fam-2.56.1-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829118" comment="glib2-static-2.56.1-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829119" comment="glib2-tests-2.56.1-9.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1108" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2206.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2206.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829120" comment="firefox-78.11.0-3.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1109" version="1" class="patch">
	<metadata>
		<title>security update for libwebp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011/" source="CVE"/>
		<reference ref_id="CVE-2020-36328" ref_url="https://www.suse.com/security/cve/CVE-2020-36328/" source="CVE"/>
		<reference ref_id="CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2260.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2260.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25011">CVE-2018-25011 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36328/">CVE-2020-36328 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36328">CVE-2020-36328 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36329">CVE-2020-36329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829121" comment="libwebp-0.3.0-10.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829122" comment="libwebp-devel-0.3.0-10.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829123" comment="libwebp-java-0.3.0-10.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829124" comment="libwebp-tools-0.3.0-10.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1110" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-29956" ref_url="https://www.suse.com/security/cve/CVE-2021-29956/" source="CVE"/>
		<reference ref_id="CVE-2021-29957" ref_url="https://www.suse.com/security/cve/CVE-2021-29957/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2263.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2263.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29956/">CVE-2021-29956 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29956">CVE-2021-29956 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29957/">CVE-2021-29957 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29957">CVE-2021-29957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29967">CVE-2021-29967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829125" comment="thunderbird-78.11.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1111" version="1" class="patch">
	<metadata>
		<title>security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2305.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2305.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829126" comment="microcode_ctl-2.1-73.9.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1112" version="1" class="patch">
	<metadata>
		<title>security update for samba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2313.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2313.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20254">CVE-2021-20254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829127" comment="ctdb-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829128" comment="ctdb-tests-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829129" comment="libsmbclient-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829130" comment="libsmbclient-devel-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829131" comment="libwbclient-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829132" comment="libwbclient-devel-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829133" comment="samba-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829134" comment="samba-client-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829135" comment="samba-client-libs-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829136" comment="samba-common-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829137" comment="samba-common-libs-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829138" comment="samba-common-tools-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829139" comment="samba-dc-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829140" comment="samba-dc-libs-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829141" comment="samba-devel-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829142" comment="samba-krb5-printing-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829143" comment="samba-libs-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829144" comment="samba-pidl-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829145" comment="samba-python-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829146" comment="samba-python-test-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829147" comment="samba-test-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829148" comment="samba-test-libs-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829149" comment="samba-vfs-glusterfs-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829150" comment="samba-winbind-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829151" comment="samba-winbind-clients-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829152" comment="samba-winbind-krb5-locator-4.10.16-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829153" comment="samba-winbind-modules-4.10.16-15.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1113" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362/" source="CVE"/>
		<reference ref_id="CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363/" source="CVE"/>
		<reference ref_id="CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364/" source="CVE"/>
		<reference ref_id="CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2314.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2314.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12362">CVE-2020-12362 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12363">CVE-2020-12363 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12364">CVE-2020-12364 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27170">CVE-2020-27170 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829154" comment="bpftool-3.10.0-1160.31.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829155" comment="kernel-3.10.0-1160.31.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829156" comment="kernel-abi-whitelists-3.10.0-1160.31.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829157" comment="kernel-debug-3.10.0-1160.31.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829160" comment="kernel-doc-3.10.0-1160.31.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829161" comment="kernel-headers-3.10.0-1160.31.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829162" comment="kernel-tools-3.10.0-1160.31.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829163" comment="kernel-tools-libs-3.10.0-1160.31.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829165" comment="perf-3.10.0-1160.31.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829166" comment="python-perf-3.10.0-1160.31.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1114" version="1" class="patch">
	<metadata>
		<title>security update for hivex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-3504" ref_url="https://www.suse.com/security/cve/CVE-2021-3504/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2318.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2318.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3504/">CVE-2021-3504 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3504">CVE-2021-3504 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829167" comment="hivex-1.3.10-6.11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829168" comment="hivex-devel-1.3.10-6.11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829169" comment="ocaml-hivex-1.3.10-6.11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829170" comment="ocaml-hivex-devel-1.3.10-6.11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829171" comment="perl-hivex-1.3.10-6.11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829172" comment="python-hivex-1.3.10-6.11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829173" comment="ruby-hivex-1.3.10-6.11.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1115" version="1" class="patch">
	<metadata>
		<title>security update for qemu-kvm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2322.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2322.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29443">CVE-2020-29443 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829174" comment="qemu-img-1.5.3-175.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829175" comment="qemu-kvm-1.5.3-175.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829176" comment="qemu-kvm-common-1.5.3-175.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829177" comment="qemu-kvm-tools-1.5.3-175.el7_9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1116" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-35518" ref_url="https://www.suse.com/security/cve/CVE-2020-35518/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2323.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2323.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35518/">CVE-2020-35518 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35518">CVE-2020-35518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829178" comment="389-ds-base-1.3.10.2-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829179" comment="389-ds-base-devel-1.3.10.2-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829180" comment="389-ds-base-libs-1.3.10.2-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829181" comment="389-ds-base-snmp-1.3.10.2-12.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1117" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qtimageformats (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011/" source="CVE"/>
		<reference ref_id="CVE-2018-25014" ref_url="https://www.suse.com/security/cve/CVE-2018-25014/" source="CVE"/>
		<reference ref_id="CVE-2020-36328" ref_url="https://www.suse.com/security/cve/CVE-2020-36328/" source="CVE"/>
		<reference ref_id="CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2328.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2328.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25011">CVE-2018-25011 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25014/">CVE-2018-25014 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25014">CVE-2018-25014 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36328/">CVE-2020-36328 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36328">CVE-2020-36328 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36329">CVE-2020-36329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829182" comment="qt5-qtimageformats-5.9.7-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829183" comment="qt5-qtimageformats-doc-5.9.7-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829182" comment="qt5-qtimageformats-5.9.7-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829183" comment="qt5-qtimageformats-doc-5.9.7-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1118" version="1" class="patch">
	<metadata>
		<title>security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2357.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2357.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25217">CVE-2021-25217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829184" comment="dhclient-4.2.5-83.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829185" comment="dhcp-4.2.5-83.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829186" comment="dhcp-common-4.2.5-83.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829187" comment="dhcp-devel-4.2.5-83.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829188" comment="dhcp-libs-4.2.5-83.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829184" comment="dhclient-4.2.5-83.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829185" comment="dhcp-4.2.5-83.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829186" comment="dhcp-common-4.2.5-83.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829187" comment="dhcp-devel-4.2.5-83.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829188" comment="dhcp-libs-4.2.5-83.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1119" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2397.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2397.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32027">CVE-2021-32027 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829189" comment="postgresql-9.2.24-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829190" comment="postgresql-contrib-9.2.24-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829191" comment="postgresql-devel-9.2.24-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829192" comment="postgresql-docs-9.2.24-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829193" comment="postgresql-libs-9.2.24-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829194" comment="postgresql-plperl-9.2.24-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829195" comment="postgresql-plpython-9.2.24-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829196" comment="postgresql-pltcl-9.2.24-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829197" comment="postgresql-server-9.2.24-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829198" comment="postgresql-static-9.2.24-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829199" comment="postgresql-test-9.2.24-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829200" comment="postgresql-upgrade-9.2.24-7.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1120" version="1" class="patch">
	<metadata>
		<title>security update for gupnp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-33516" ref_url="https://www.suse.com/security/cve/CVE-2021-33516/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2417.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2417.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-33516/">CVE-2021-33516 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33516">CVE-2021-33516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829201" comment="gupnp-1.0.2-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829202" comment="gupnp-devel-1.0.2-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829203" comment="gupnp-docs-1.0.2-6.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829201" comment="gupnp-1.0.2-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829202" comment="gupnp-devel-1.0.2-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829203" comment="gupnp-docs-1.0.2-6.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1121" version="1" class="patch">
	<metadata>
		<title>security update for linuxptp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-3570" ref_url="https://www.suse.com/security/cve/CVE-2021-3570/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2658.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2658.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3570/">CVE-2021-3570 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3570">CVE-2021-3570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829204" comment="linuxptp-2.0-2.el7_9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829204" comment="linuxptp-2.0-2.el7_9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1122" version="1" class="patch">
	<metadata>
		<title>security update for xstream (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-29505" ref_url="https://www.suse.com/security/cve/CVE-2021-29505/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2683.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2683.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29505/">CVE-2021-29505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29505">CVE-2021-29505 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829205" comment="xstream-1.3.1-14.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829206" comment="xstream-javadoc-1.3.1-14.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1123" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-20934" ref_url="https://www.suse.com/security/cve/CVE-2019-20934/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2725.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2725.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20934/">CVE-2019-20934 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20934">CVE-2019-20934 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33033">CVE-2021-33033 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829207" comment="bpftool-3.10.0-1160.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829208" comment="kernel-3.10.0-1160.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829209" comment="kernel-abi-whitelists-3.10.0-1160.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829210" comment="kernel-debug-3.10.0-1160.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829213" comment="kernel-doc-3.10.0-1160.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829214" comment="kernel-headers-3.10.0-1160.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829215" comment="kernel-tools-3.10.0-1160.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829216" comment="kernel-tools-libs-3.10.0-1160.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829218" comment="perf-3.10.0-1160.36.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829219" comment="python-perf-3.10.0-1160.36.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1124" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2741.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2741.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829220" comment="firefox-78.12.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1125" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2784.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2784.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829221" comment="java-11-openjdk-11.0.12.0.7-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829222" comment="java-11-openjdk-demo-11.0.12.0.7-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829223" comment="java-11-openjdk-devel-11.0.12.0.7-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829224" comment="java-11-openjdk-headless-11.0.12.0.7-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829225" comment="java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829226" comment="java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829227" comment="java-11-openjdk-jmods-11.0.12.0.7-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829228" comment="java-11-openjdk-src-11.0.12.0.7-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829229" comment="java-11-openjdk-static-libs-11.0.12.0.7-0.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1126" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2845.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2845.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2341">CVE-2021-2341 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2369">CVE-2021-2369 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-2388">CVE-2021-2388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829230" comment="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829231" comment="java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829232" comment="java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829233" comment="java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829234" comment="java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829235" comment="java-1.8.0-openjdk-javadoc-1.8.0.302.b08-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829236" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.302.b08-0.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829237" comment="java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1127" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-29969" ref_url="https://www.suse.com/security/cve/CVE-2021-29969/" source="CVE"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2881.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2881.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29969/">CVE-2021-29969 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29969">CVE-2021-29969 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29970">CVE-2021-29970 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29976">CVE-2021-29976 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30547">CVE-2021-30547 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829238" comment="thunderbird-78.12.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1128" version="1" class="patch">
	<metadata>
		<title>security update for lasso (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-28091" ref_url="https://www.suse.com/security/cve/CVE-2021-28091/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:2989.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:2989.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28091/">CVE-2021-28091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28091">CVE-2021-28091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829239" comment="lasso-2.5.1-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829240" comment="lasso-devel-2.5.1-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829241" comment="lasso-python-2.5.1-8.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829239" comment="lasso-2.5.1-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829240" comment="lasso-devel-2.5.1-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829241" comment="lasso-python-2.5.1-8.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1129" version="1" class="patch">
	<metadata>
		<title>security update for microcode_ctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3028.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3028.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829242" comment="microcode_ctl-2.1-73.11.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1130" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3154.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3154.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829243" comment="firefox-78.13.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1131" version="1" class="patch">
	<metadata>
		<title>security update for exiv2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-31291" ref_url="https://www.suse.com/security/cve/CVE-2021-31291/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3158.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3158.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31291/">CVE-2021-31291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-31291">CVE-2021-31291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829244" comment="exiv2-0.27.0-4.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829245" comment="exiv2-devel-0.27.0-4.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829246" comment="exiv2-doc-0.27.0-4.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829247" comment="exiv2-libs-0.27.0-4.el7_8 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829244" comment="exiv2-0.27.0-4.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829245" comment="exiv2-devel-0.27.0-4.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829246" comment="exiv2-doc-0.27.0-4.el7_8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829247" comment="exiv2-libs-0.27.0-4.el7_8 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1132" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3160.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3160.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29980">CVE-2021-29980 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29984">CVE-2021-29984 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29985">CVE-2021-29985 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29986">CVE-2021-29986 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29988">CVE-2021-29988 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29989">CVE-2021-29989 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829248" comment="thunderbird-78.13.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1133" version="1" class="patch">
	<metadata>
		<title>security update for compat-exiv2-026 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-31291" ref_url="https://www.suse.com/security/cve/CVE-2021-31291/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3233.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3233.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31291/">CVE-2021-31291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-31291">CVE-2021-31291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829249" comment="compat-exiv2-026-0.26-3.el7_9 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829249" comment="compat-exiv2-026-0.26-3.el7_9 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1134" version="1" class="patch">
	<metadata>
		<title>security update for compat-exiv2-023 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-31291" ref_url="https://www.suse.com/security/cve/CVE-2021-31291/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3234.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3234.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31291/">CVE-2021-31291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-31291">CVE-2021-31291 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829250" comment="compat-exiv2-023-0.23-2.el7_9 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829250" comment="compat-exiv2-023-0.23-2.el7_9 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1135" version="1" class="patch">
	<metadata>
		<title>security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3295.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3295.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3246">CVE-2021-3246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829251" comment="libsndfile-1.0.25-12.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829252" comment="libsndfile-devel-1.0.25-12.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829253" comment="libsndfile-utils-1.0.25-12.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829251" comment="libsndfile-1.0.25-12.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829252" comment="libsndfile-devel-1.0.25-12.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829253" comment="libsndfile-utils-1.0.25-12.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1136" version="1" class="patch">
	<metadata>
		<title>security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3296.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3296.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829254" comment="libX11-1.6.7-4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829255" comment="libX11-common-1.6.7-4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829256" comment="libX11-devel-1.6.7-4.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1137" version="1" class="patch">
	<metadata>
		<title>security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3325.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3325.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214">CVE-2021-25214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829257" comment="bind-9.11.4-26.P2.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829258" comment="bind-chroot-9.11.4-26.P2.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829259" comment="bind-devel-9.11.4-26.P2.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829260" comment="bind-export-devel-9.11.4-26.P2.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829261" comment="bind-export-libs-9.11.4-26.P2.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829262" comment="bind-libs-9.11.4-26.P2.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829263" comment="bind-libs-lite-9.11.4-26.P2.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829264" comment="bind-license-9.11.4-26.P2.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829265" comment="bind-lite-devel-9.11.4-26.P2.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829266" comment="bind-pkcs11-9.11.4-26.P2.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829267" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829268" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829269" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829270" comment="bind-sdb-9.11.4-26.P2.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829271" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829272" comment="bind-utils-9.11.4-26.P2.el7_9.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1138" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3327.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3327.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27777">CVE-2020-27777 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829273" comment="bpftool-3.10.0-1160.41.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829274" comment="kernel-3.10.0-1160.41.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829275" comment="kernel-abi-whitelists-3.10.0-1160.41.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829276" comment="kernel-debug-3.10.0-1160.41.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829279" comment="kernel-doc-3.10.0-1160.41.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829280" comment="kernel-headers-3.10.0-1160.41.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829281" comment="kernel-tools-3.10.0-1160.41.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829282" comment="kernel-tools-libs-3.10.0-1160.41.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829284" comment="perf-3.10.0-1160.41.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829285" comment="python-perf-3.10.0-1160.41.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1139" version="1" class="patch">
	<metadata>
		<title>security update for sssd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-3621" ref_url="https://www.suse.com/security/cve/CVE-2021-3621/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3336.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3336.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3621/">CVE-2021-3621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3621">CVE-2021-3621 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829286" comment="libipa_hbac-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829287" comment="libipa_hbac-devel-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829288" comment="libsss_autofs-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829289" comment="libsss_certmap-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829290" comment="libsss_certmap-devel-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829291" comment="libsss_idmap-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829292" comment="libsss_idmap-devel-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829293" comment="libsss_nss_idmap-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829294" comment="libsss_nss_idmap-devel-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829295" comment="libsss_simpleifp-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829296" comment="libsss_simpleifp-devel-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829297" comment="libsss_sudo-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829298" comment="python-libipa_hbac-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829299" comment="python-libsss_nss_idmap-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829300" comment="python-sss-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829301" comment="python-sss-murmur-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829302" comment="python-sssdconfig-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829303" comment="sssd-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829304" comment="sssd-ad-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829305" comment="sssd-client-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829306" comment="sssd-common-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829307" comment="sssd-common-pac-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829308" comment="sssd-dbus-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829309" comment="sssd-ipa-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829310" comment="sssd-kcm-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829311" comment="sssd-krb5-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829312" comment="sssd-krb5-common-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829313" comment="sssd-ldap-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829314" comment="sssd-libwbclient-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829315" comment="sssd-libwbclient-devel-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829316" comment="sssd-polkit-rules-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829317" comment="sssd-proxy-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829318" comment="sssd-tools-1.16.5-10.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829319" comment="sssd-winbind-idmap-1.16.5-10.el7_9.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1140" version="1" class="patch">
	<metadata>
		<title>security update for hivex (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-3622" ref_url="https://www.suse.com/security/cve/CVE-2021-3622/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3338.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3338.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3622/">CVE-2021-3622 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3622">CVE-2021-3622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829320" comment="hivex-1.3.10-6.12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829321" comment="hivex-devel-1.3.10-6.12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829322" comment="ocaml-hivex-1.3.10-6.12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829323" comment="ocaml-hivex-devel-1.3.10-6.12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829324" comment="perl-hivex-1.3.10-6.12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829325" comment="python-hivex-1.3.10-6.12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829326" comment="ruby-hivex-1.3.10-6.12.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829320" comment="hivex-1.3.10-6.12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829321" comment="hivex-devel-1.3.10-6.12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829322" comment="ocaml-hivex-1.3.10-6.12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829323" comment="ocaml-hivex-devel-1.3.10-6.12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829324" comment="perl-hivex-1.3.10-6.12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829325" comment="python-hivex-1.3.10-6.12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829326" comment="ruby-hivex-1.3.10-6.12.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1141" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3438.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3438.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829327" comment="bpftool-3.10.0-1160.42.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829328" comment="kernel-3.10.0-1160.42.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829329" comment="kernel-abi-whitelists-3.10.0-1160.42.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829330" comment="kernel-debug-3.10.0-1160.42.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829333" comment="kernel-doc-3.10.0-1160.42.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829334" comment="kernel-headers-3.10.0-1160.42.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829335" comment="kernel-tools-3.10.0-1160.42.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829336" comment="kernel-tools-libs-3.10.0-1160.42.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829338" comment="perf-3.10.0-1160.42.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829339" comment="python-perf-3.10.0-1160.42.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1142" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-38493" ref_url="https://www.suse.com/security/cve/CVE-2021-38493/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3494.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3494.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38493/">CVE-2021-38493 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38493">CVE-2021-38493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829340" comment="thunderbird-78.14.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1143" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-38493" ref_url="https://www.suse.com/security/cve/CVE-2021-38493/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3498.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3498.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38493/">CVE-2021-38493 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38493">CVE-2021-38493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829341" comment="firefox-78.14.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1144" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3791.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3791.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829342" comment="firefox-91.2.0-4.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1145" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3798.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3798.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829343" comment="openssl-1.0.2k-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829344" comment="openssl-devel-1.0.2k-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829345" comment="openssl-libs-1.0.2k-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829346" comment="openssl-perl-1.0.2k-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829347" comment="openssl-static-1.0.2k-22.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1146" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3801.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3801.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22543">CVE-2021-22543 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3656">CVE-2021-3656 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829348" comment="bpftool-3.10.0-1160.45.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829349" comment="kernel-3.10.0-1160.45.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829350" comment="kernel-abi-whitelists-3.10.0-1160.45.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829351" comment="kernel-debug-3.10.0-1160.45.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829354" comment="kernel-doc-3.10.0-1160.45.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829355" comment="kernel-headers-3.10.0-1160.45.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829356" comment="kernel-tools-3.10.0-1160.45.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829357" comment="kernel-tools-libs-3.10.0-1160.45.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829359" comment="perf-3.10.0-1160.45.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829360" comment="python-perf-3.10.0-1160.45.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1147" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-3652" ref_url="https://www.suse.com/security/cve/CVE-2021-3652/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3807.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3807.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3652/">CVE-2021-3652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3652">CVE-2021-3652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829361" comment="389-ds-base-1.3.10.2-13.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829362" comment="389-ds-base-devel-1.3.10.2-13.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829363" comment="389-ds-base-libs-1.3.10.2-13.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829364" comment="389-ds-base-snmp-1.3.10.2-13.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1148" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3810.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3810.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829365" comment="libxml2-2.9.1-6.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829366" comment="libxml2-devel-2.9.1-6.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829367" comment="libxml2-python-2.9.1-6.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829368" comment="libxml2-static-2.9.1-6.el7_9.6 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829365" comment="libxml2-2.9.1-6.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829366" comment="libxml2-devel-2.9.1-6.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829367" comment="libxml2-python-2.9.1-6.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829368" comment="libxml2-static-2.9.1-6.el7_9.6 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1149" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="CVE-2021-38502" ref_url="https://www.suse.com/security/cve/CVE-2021-38502/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3841.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3841.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32810">CVE-2021-32810 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38496">CVE-2021-38496 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38497">CVE-2021-38497 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38498">CVE-2021-38498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38500">CVE-2021-38500 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38501">CVE-2021-38501 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38502/">CVE-2021-38502 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38502">CVE-2021-38502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829369" comment="thunderbird-91.2.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1150" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3856.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3856.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40438">CVE-2021-40438 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829370" comment="httpd-2.4.6-97.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829371" comment="httpd-devel-2.4.6-97.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829372" comment="httpd-manual-2.4.6-97.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829373" comment="httpd-tools-2.4.6-97.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829374" comment="mod_ldap-2.4.6-97.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829375" comment="mod_proxy_html-2.4.6-97.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829376" comment="mod_session-2.4.6-97.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829377" comment="mod_ssl-2.4.6-97.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1151" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3889.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3889.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35588">CVE-2021-35588 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829378" comment="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829379" comment="java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829380" comment="java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829381" comment="java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829382" comment="java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829383" comment="java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829384" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829385" comment="java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1152" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3892.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3892.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35550">CVE-2021-35550 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35556">CVE-2021-35556 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35559">CVE-2021-35559 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35561">CVE-2021-35561 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35564">CVE-2021-35564 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35565">CVE-2021-35565 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35567">CVE-2021-35567 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35578">CVE-2021-35578 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35586">CVE-2021-35586 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35603">CVE-2021-35603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829386" comment="java-11-openjdk-11.0.13.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829387" comment="java-11-openjdk-demo-11.0.13.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829388" comment="java-11-openjdk-devel-11.0.13.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829389" comment="java-11-openjdk-headless-11.0.13.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829390" comment="java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829391" comment="java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829392" comment="java-11-openjdk-jmods-11.0.13.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829393" comment="java-11-openjdk-src-11.0.13.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829394" comment="java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1153" version="1" class="patch">
	<metadata>
		<title>security update for xstream (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-39139" ref_url="https://www.suse.com/security/cve/CVE-2021-39139/" source="CVE"/>
		<reference ref_id="CVE-2021-39140" ref_url="https://www.suse.com/security/cve/CVE-2021-39140/" source="CVE"/>
		<reference ref_id="CVE-2021-39141" ref_url="https://www.suse.com/security/cve/CVE-2021-39141/" source="CVE"/>
		<reference ref_id="CVE-2021-39144" ref_url="https://www.suse.com/security/cve/CVE-2021-39144/" source="CVE"/>
		<reference ref_id="CVE-2021-39145" ref_url="https://www.suse.com/security/cve/CVE-2021-39145/" source="CVE"/>
		<reference ref_id="CVE-2021-39146" ref_url="https://www.suse.com/security/cve/CVE-2021-39146/" source="CVE"/>
		<reference ref_id="CVE-2021-39147" ref_url="https://www.suse.com/security/cve/CVE-2021-39147/" source="CVE"/>
		<reference ref_id="CVE-2021-39148" ref_url="https://www.suse.com/security/cve/CVE-2021-39148/" source="CVE"/>
		<reference ref_id="CVE-2021-39149" ref_url="https://www.suse.com/security/cve/CVE-2021-39149/" source="CVE"/>
		<reference ref_id="CVE-2021-39150" ref_url="https://www.suse.com/security/cve/CVE-2021-39150/" source="CVE"/>
		<reference ref_id="CVE-2021-39151" ref_url="https://www.suse.com/security/cve/CVE-2021-39151/" source="CVE"/>
		<reference ref_id="CVE-2021-39152" ref_url="https://www.suse.com/security/cve/CVE-2021-39152/" source="CVE"/>
		<reference ref_id="CVE-2021-39153" ref_url="https://www.suse.com/security/cve/CVE-2021-39153/" source="CVE"/>
		<reference ref_id="CVE-2021-39154" ref_url="https://www.suse.com/security/cve/CVE-2021-39154/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:3956.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:3956.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39139/">CVE-2021-39139 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39139">CVE-2021-39139 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39140/">CVE-2021-39140 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39140">CVE-2021-39140 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39141/">CVE-2021-39141 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39141">CVE-2021-39141 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39144/">CVE-2021-39144 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39144">CVE-2021-39144 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39145/">CVE-2021-39145 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39145">CVE-2021-39145 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39146/">CVE-2021-39146 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39146">CVE-2021-39146 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39147/">CVE-2021-39147 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39147">CVE-2021-39147 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39148/">CVE-2021-39148 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39148">CVE-2021-39148 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39149/">CVE-2021-39149 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39149">CVE-2021-39149 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39150/">CVE-2021-39150 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39150">CVE-2021-39150 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39151/">CVE-2021-39151 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39151">CVE-2021-39151 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39152/">CVE-2021-39152 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39152">CVE-2021-39152 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39153/">CVE-2021-39153 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39153">CVE-2021-39153 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39154/">CVE-2021-39154 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39154">CVE-2021-39154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829395" comment="xstream-1.3.1-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829396" comment="xstream-javadoc-1.3.1-16.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1154" version="1" class="patch">
	<metadata>
		<title>security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-42574" ref_url="https://www.suse.com/security/cve/CVE-2021-42574/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4033.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4033.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42574/">CVE-2021-42574 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42574">CVE-2021-42574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829397" comment="binutils-2.27-44.base.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829398" comment="binutils-devel-2.27-44.base.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829397" comment="binutils-2.27-44.base.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829398" comment="binutils-devel-2.27-44.base.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1155" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-41133" ref_url="https://www.suse.com/security/cve/CVE-2021-41133/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4044.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4044.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41133/">CVE-2021-41133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41133">CVE-2021-41133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829399" comment="flatpak-1.0.9-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829400" comment="flatpak-builder-1.0.0-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829401" comment="flatpak-devel-1.0.9-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829402" comment="flatpak-libs-1.0.9-12.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829399" comment="flatpak-1.0.9-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829400" comment="flatpak-builder-1.0.0-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829401" comment="flatpak-devel-1.0.9-12.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829402" comment="flatpak-libs-1.0.9-12.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1156" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4116.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4116.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829403" comment="firefox-91.3.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1157" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4134.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4134.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38503">CVE-2021-38503 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38504">CVE-2021-38504 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38506">CVE-2021-38506 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38507">CVE-2021-38507 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38508">CVE-2021-38508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38509">CVE-2021-38509 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829404" comment="thunderbird-91.3.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1158" version="1" class="patch">
	<metadata>
		<title>security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-41159" ref_url="https://www.suse.com/security/cve/CVE-2021-41159/" source="CVE"/>
		<reference ref_id="CVE-2021-41160" ref_url="https://www.suse.com/security/cve/CVE-2021-41160/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4619.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4619.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41159/">CVE-2021-41159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41159">CVE-2021-41159 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41160/">CVE-2021-41160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41160">CVE-2021-41160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829405" comment="freerdp-2.1.1-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829406" comment="freerdp-devel-2.1.1-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829407" comment="freerdp-libs-2.1.1-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829408" comment="libwinpr-2.1.1-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829409" comment="libwinpr-devel-2.1.1-5.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829405" comment="freerdp-2.1.1-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829406" comment="freerdp-devel-2.1.1-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829407" comment="freerdp-libs-2.1.1-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829408" comment="libwinpr-2.1.1-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829409" comment="libwinpr-devel-2.1.1-5.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1159" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4777.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4777.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829410" comment="bpftool-3.10.0-1160.49.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829411" comment="kernel-3.10.0-1160.49.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829412" comment="kernel-abi-whitelists-3.10.0-1160.49.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829413" comment="kernel-debug-3.10.0-1160.49.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829416" comment="kernel-doc-3.10.0-1160.49.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829417" comment="kernel-headers-3.10.0-1160.49.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829418" comment="kernel-tools-3.10.0-1160.49.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829419" comment="kernel-tools-libs-3.10.0-1160.49.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829421" comment="perf-3.10.0-1160.49.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829422" comment="python-perf-3.10.0-1160.49.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1160" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4782.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4782.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829423" comment="openssh-7.4p1-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829424" comment="openssh-askpass-7.4p1-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829425" comment="openssh-cavs-7.4p1-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829426" comment="openssh-clients-7.4p1-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829427" comment="openssh-keycat-7.4p1-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829428" comment="openssh-ldap-7.4p1-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829429" comment="openssh-server-7.4p1-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829430" comment="openssh-server-sysvinit-7.4p1-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829431" comment="pam_ssh_agent_auth-0.10.3-2.22.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1161" version="1" class="patch">
	<metadata>
		<title>security update for rpm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-20271" ref_url="https://www.suse.com/security/cve/CVE-2021-20271/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4785.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4785.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20271/">CVE-2021-20271 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20271">CVE-2021-20271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829432" comment="rpm-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829433" comment="rpm-apidocs-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829434" comment="rpm-build-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829435" comment="rpm-build-libs-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829436" comment="rpm-cron-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829437" comment="rpm-devel-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829438" comment="rpm-libs-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829439" comment="rpm-plugin-systemd-inhibit-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829440" comment="rpm-python-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829441" comment="rpm-sign-4.11.3-48.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829432" comment="rpm-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829433" comment="rpm-apidocs-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829434" comment="rpm-build-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829435" comment="rpm-build-libs-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829436" comment="rpm-cron-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829437" comment="rpm-devel-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829438" comment="rpm-libs-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829439" comment="rpm-plugin-systemd-inhibit-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829440" comment="rpm-python-4.11.3-48.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829441" comment="rpm-sign-4.11.3-48.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1162" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-37750" ref_url="https://www.suse.com/security/cve/CVE-2021-37750/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4788.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4788.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37750/">CVE-2021-37750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">CVE-2021-37750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829442" comment="krb5-devel-1.15.1-51.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829443" comment="krb5-libs-1.15.1-51.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829444" comment="krb5-pkinit-1.15.1-51.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829445" comment="krb5-server-1.15.1-51.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829446" comment="krb5-server-ldap-1.15.1-51.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829447" comment="krb5-workstation-1.15.1-51.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829448" comment="libkadm5-1.15.1-51.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1163" version="1" class="patch">
	<metadata>
		<title>security update for nss (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4904.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4904.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829449" comment="nss-3.67.0-4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829450" comment="nss-devel-3.67.0-4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829451" comment="nss-pkcs11-devel-3.67.0-4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829452" comment="nss-sysinit-3.67.0-4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829453" comment="nss-tools-3.67.0-4.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1164" version="1" class="patch">
	<metadata>
		<title>security update for mailman (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893/" source="CVE"/>
		<reference ref_id="CVE-2021-42097" ref_url="https://www.suse.com/security/cve/CVE-2021-42097/" source="CVE"/>
		<reference ref_id="CVE-2021-44227" ref_url="https://www.suse.com/security/cve/CVE-2021-44227/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:4913.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:4913.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6893">CVE-2016-6893 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-42097/">CVE-2021-42097 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42097">CVE-2021-42097 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-44227/">CVE-2021-44227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44227">CVE-2021-44227 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829454" comment="mailman-2.1.15-30.el7_9.2 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829454" comment="mailman-2.1.15-30.el7_9.2 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1165" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:5014.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:5014.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829455" comment="firefox-91.4.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1166" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-43528" ref_url="https://www.suse.com/security/cve/CVE-2021-43528/" source="CVE"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:5046.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:5046.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43528/">CVE-2021-43528 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43528">CVE-2021-43528 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43536">CVE-2021-43536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43537">CVE-2021-43537 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43538">CVE-2021-43538 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43539">CVE-2021-43539 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43541">CVE-2021-43541 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43542">CVE-2021-43542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43543">CVE-2021-43543 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43545">CVE-2021-43545 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43546">CVE-2021-43546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829456" comment="thunderbird-91.4.0-3.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1167" version="1" class="patch">
	<metadata>
		<title>security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:5192.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:5192.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2124">CVE-2016-2124 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25717">CVE-2020-25717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829457" comment="ctdb-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829458" comment="ctdb-tests-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829459" comment="libsmbclient-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829460" comment="libsmbclient-devel-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829461" comment="libwbclient-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829462" comment="libwbclient-devel-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829463" comment="samba-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829464" comment="samba-client-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829465" comment="samba-client-libs-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829466" comment="samba-common-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829467" comment="samba-common-libs-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829468" comment="samba-common-tools-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829469" comment="samba-dc-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829470" comment="samba-dc-libs-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829471" comment="samba-devel-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829472" comment="samba-krb5-printing-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829473" comment="samba-libs-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829474" comment="samba-pidl-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829475" comment="samba-python-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829476" comment="samba-python-test-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829477" comment="samba-test-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829478" comment="samba-test-libs-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829479" comment="samba-vfs-glusterfs-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829480" comment="samba-winbind-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829481" comment="samba-winbind-clients-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829482" comment="samba-winbind-krb5-locator-4.10.16-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829483" comment="samba-winbind-modules-4.10.16-17.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1168" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-25719" ref_url="https://www.suse.com/security/cve/CVE-2020-25719/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2021:5195.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2021:5195.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25719/">CVE-2020-25719 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25719">CVE-2020-25719 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829484" comment="ipa-client-4.6.8-5.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829485" comment="ipa-client-common-4.6.8-5.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829486" comment="ipa-common-4.6.8-5.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829487" comment="ipa-python-compat-4.6.8-5.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829488" comment="ipa-server-4.6.8-5.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829489" comment="ipa-server-common-4.6.8-5.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829490" comment="ipa-server-dns-4.6.8-5.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829491" comment="ipa-server-trust-ad-4.6.8-5.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829492" comment="python2-ipaclient-4.6.8-5.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829493" comment="python2-ipalib-4.6.8-5.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829494" comment="python2-ipaserver-4.6.8-5.el7_9.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1169" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4010" ref_url="https://www.suse.com/security/cve/CVE-2021-4010/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0003.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0003.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4008">CVE-2021-4008 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4009">CVE-2021-4009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4010/">CVE-2021-4010 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4010">CVE-2021-4010 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4011">CVE-2021-4011 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829495" comment="xorg-x11-server-Xdmx-1.20.4-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829496" comment="xorg-x11-server-Xephyr-1.20.4-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829497" comment="xorg-x11-server-Xnest-1.20.4-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829498" comment="xorg-x11-server-Xorg-1.20.4-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829499" comment="xorg-x11-server-Xvfb-1.20.4-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829500" comment="xorg-x11-server-Xwayland-1.20.4-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829501" comment="xorg-x11-server-common-1.20.4-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829502" comment="xorg-x11-server-devel-1.20.4-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829503" comment="xorg-x11-server-source-1.20.4-17.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1170" version="1" class="patch">
	<metadata>
		<title>security update for webkitgtk4 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0059.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0059.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30858">CVE-2021-30858 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829504" comment="webkitgtk4-2.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829505" comment="webkitgtk4-devel-2.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829506" comment="webkitgtk4-doc-2.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829507" comment="webkitgtk4-jsc-2.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829508" comment="webkitgtk4-jsc-devel-2.28.2-3.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829504" comment="webkitgtk4-2.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829505" comment="webkitgtk4-devel-2.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829506" comment="webkitgtk4-doc-2.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829507" comment="webkitgtk4-jsc-2.28.2-3.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829508" comment="webkitgtk4-jsc-devel-2.28.2-3.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1171" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0063.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0063.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25704">CVE-2020-25704 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829509" comment="bpftool-3.10.0-1160.53.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829510" comment="kernel-3.10.0-1160.53.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829511" comment="kernel-abi-whitelists-3.10.0-1160.53.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829512" comment="kernel-debug-3.10.0-1160.53.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829515" comment="kernel-doc-3.10.0-1160.53.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829516" comment="kernel-headers-3.10.0-1160.53.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829517" comment="kernel-tools-3.10.0-1160.53.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829518" comment="kernel-tools-libs-3.10.0-1160.53.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829520" comment="perf-3.10.0-1160.53.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829521" comment="python-perf-3.10.0-1160.53.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1172" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0064.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0064.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829522" comment="openssl-1.0.2k-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829523" comment="openssl-devel-1.0.2k-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829524" comment="openssl-libs-1.0.2k-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829525" comment="openssl-perl-1.0.2k-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829526" comment="openssl-static-1.0.2k-23.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1173" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0124.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0124.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829527" comment="firefox-91.5.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1174" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0127.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0127.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4140">CVE-2021-4140 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22737">CVE-2022-22737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22738">CVE-2022-22738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22739">CVE-2022-22739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22740">CVE-2022-22740 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22741">CVE-2022-22741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22742">CVE-2022-22742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22743">CVE-2022-22743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22745">CVE-2022-22745 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22747">CVE-2022-22747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22748">CVE-2022-22748 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22751">CVE-2022-22751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829528" comment="thunderbird-91.5.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1175" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-26691" ref_url="https://www.suse.com/security/cve/CVE-2021-26691/" source="CVE"/>
		<reference ref_id="CVE-2021-34798" ref_url="https://www.suse.com/security/cve/CVE-2021-34798/" source="CVE"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<reference ref_id="CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0143.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0143.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26691/">CVE-2021-26691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26691">CVE-2021-26691 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34798/">CVE-2021-34798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34798">CVE-2021-34798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39275">CVE-2021-39275 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44790">CVE-2021-44790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829529" comment="httpd-2.4.6-97.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829530" comment="httpd-devel-2.4.6-97.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829531" comment="httpd-manual-2.4.6-97.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829532" comment="httpd-tools-2.4.6-97.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829533" comment="mod_ldap-2.4.6-97.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829534" comment="mod_proxy_html-2.4.6-97.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829535" comment="mod_session-2.4.6-97.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829536" comment="mod_ssl-2.4.6-97.el7_9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1176" version="1" class="patch">
	<metadata>
		<title>security update for gegl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-45463" ref_url="https://www.suse.com/security/cve/CVE-2021-45463/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0162.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0162.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45463/">CVE-2021-45463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45463">CVE-2021-45463 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829537" comment="gegl-0.2.0-19.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829538" comment="gegl-devel-0.2.0-19.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829537" comment="gegl-0.2.0-19.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829538" comment="gegl-devel-0.2.0-19.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1177" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0204.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0204.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21277">CVE-2022-21277 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21291">CVE-2022-21291 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21366">CVE-2022-21366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829539" comment="java-11-openjdk-11.0.14.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829540" comment="java-11-openjdk-devel-11.0.14.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829541" comment="java-11-openjdk-headless-11.0.14.0.9-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1178" version="1" class="patch">
	<metadata>
		<title>security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0274.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0274.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829542" comment="polkit-0.112-26.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829543" comment="polkit-devel-0.112-26.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829544" comment="polkit-docs-0.112-26.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829542" comment="polkit-0.112-26.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829543" comment="polkit-devel-0.112-26.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829544" comment="polkit-docs-0.112-26.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1179" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0306.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0306.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21248">CVE-2022-21248 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21282">CVE-2022-21282 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21283">CVE-2022-21283 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21293">CVE-2022-21293 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21294">CVE-2022-21294 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21296">CVE-2022-21296 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21299">CVE-2022-21299 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21305">CVE-2022-21305 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21340">CVE-2022-21340 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21341">CVE-2022-21341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21360">CVE-2022-21360 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21365">CVE-2022-21365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829545" comment="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829546" comment="java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829547" comment="java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829548" comment="java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829549" comment="java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829550" comment="java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829551" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829552" comment="java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1180" version="1" class="patch">
	<metadata>
		<title>security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0328.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0328.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44142">CVE-2021-44142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829553" comment="ctdb-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829554" comment="ctdb-tests-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829555" comment="libsmbclient-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829556" comment="libsmbclient-devel-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829557" comment="libwbclient-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829558" comment="libwbclient-devel-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829559" comment="samba-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829560" comment="samba-client-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829561" comment="samba-client-libs-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829562" comment="samba-common-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829563" comment="samba-common-libs-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829564" comment="samba-common-tools-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829565" comment="samba-dc-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829566" comment="samba-dc-libs-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829567" comment="samba-devel-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829568" comment="samba-krb5-printing-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829569" comment="samba-libs-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829570" comment="samba-pidl-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829571" comment="samba-python-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829572" comment="samba-python-test-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829573" comment="samba-test-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829574" comment="samba-test-libs-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829575" comment="samba-vfs-glusterfs-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829576" comment="samba-winbind-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829577" comment="samba-winbind-clients-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829578" comment="samba-winbind-krb5-locator-4.10.16-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829579" comment="samba-winbind-modules-4.10.16-18.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1181" version="1" class="patch">
	<metadata>
		<title>security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0473.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0473.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45417">CVE-2021-45417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829580" comment="aide-0.15.1-13.el7_9.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829580" comment="aide-0.15.1-13.el7_9.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1182" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0514.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0514.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829581" comment="firefox-91.6.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1183" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0538.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0538.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22754">CVE-2022-22754 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22756">CVE-2022-22756 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22759">CVE-2022-22759 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22760">CVE-2022-22760 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22761">CVE-2022-22761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22763">CVE-2022-22763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22764">CVE-2022-22764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829582" comment="thunderbird-91.6.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1184" version="1" class="patch">
	<metadata>
		<title>security update for python-pillow (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-22816" ref_url="https://www.suse.com/security/cve/CVE-2022-22816/" source="CVE"/>
		<reference ref_id="CVE-2022-22817" ref_url="https://www.suse.com/security/cve/CVE-2022-22817/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0609.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0609.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22816/">CVE-2022-22816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22816">CVE-2022-22816 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22817/">CVE-2022-22817 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22817">CVE-2022-22817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829583" comment="python-pillow-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829584" comment="python-pillow-devel-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829585" comment="python-pillow-doc-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829586" comment="python-pillow-qt-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829587" comment="python-pillow-sane-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829588" comment="python-pillow-tk-2.0.0-23.gitd1c6db8.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1185" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-3564" ref_url="https://www.suse.com/security/cve/CVE-2021-3564/" source="CVE"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0620.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0620.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3564/">CVE-2021-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3564">CVE-2021-3564 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4155">CVE-2021-4155 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22942">CVE-2022-22942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829589" comment="bpftool-3.10.0-1160.59.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829590" comment="kernel-3.10.0-1160.59.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829591" comment="kernel-abi-whitelists-3.10.0-1160.59.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829592" comment="kernel-debug-3.10.0-1160.59.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829595" comment="kernel-doc-3.10.0-1160.59.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829596" comment="kernel-headers-3.10.0-1160.59.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829597" comment="kernel-tools-3.10.0-1160.59.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829598" comment="kernel-tools-libs-3.10.0-1160.59.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829600" comment="perf-3.10.0-1160.59.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829601" comment="python-perf-3.10.0-1160.59.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1186" version="1" class="patch">
	<metadata>
		<title>security update for openldap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709/" source="CVE"/>
		<reference ref_id="CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0621.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0621.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25709">CVE-2020-25709 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25710">CVE-2020-25710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829602" comment="openldap-2.4.44-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829603" comment="openldap-clients-2.4.44-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829604" comment="openldap-devel-2.4.44-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829605" comment="openldap-servers-2.4.44-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829606" comment="openldap-servers-sql-2.4.44-25.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829602" comment="openldap-2.4.44-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829603" comment="openldap-clients-2.4.44-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829604" comment="openldap-devel-2.4.44-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829605" comment="openldap-servers-2.4.44-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829606" comment="openldap-servers-sql-2.4.44-25.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1187" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-4091" ref_url="https://www.suse.com/security/cve/CVE-2021-4091/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0628.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0628.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4091/">CVE-2021-4091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4091">CVE-2021-4091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829607" comment="389-ds-base-1.3.10.2-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829608" comment="389-ds-base-devel-1.3.10.2-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829609" comment="389-ds-base-libs-1.3.10.2-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829610" comment="389-ds-base-snmp-1.3.10.2-15.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1188" version="1" class="patch">
	<metadata>
		<title>security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0666.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0666.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829611" comment="cyrus-sasl-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829612" comment="cyrus-sasl-devel-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829613" comment="cyrus-sasl-gs2-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829614" comment="cyrus-sasl-gssapi-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829615" comment="cyrus-sasl-ldap-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829616" comment="cyrus-sasl-lib-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829617" comment="cyrus-sasl-md5-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829618" comment="cyrus-sasl-ntlm-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829619" comment="cyrus-sasl-plain-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829620" comment="cyrus-sasl-scram-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829621" comment="cyrus-sasl-sql-2.1.26-24.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829611" comment="cyrus-sasl-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829612" comment="cyrus-sasl-devel-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829613" comment="cyrus-sasl-gs2-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829614" comment="cyrus-sasl-gssapi-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829615" comment="cyrus-sasl-ldap-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829616" comment="cyrus-sasl-lib-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829617" comment="cyrus-sasl-md5-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829618" comment="cyrus-sasl-ntlm-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829619" comment="cyrus-sasl-plain-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829620" comment="cyrus-sasl-scram-2.1.26-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829621" comment="cyrus-sasl-sql-2.1.26-24.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1189" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0824.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0824.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829622" comment="firefox-91.7.0-3.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1190" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-0566" ref_url="https://www.suse.com/security/cve/CVE-2022-0566/" source="CVE"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:0850.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:0850.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0566/">CVE-2022-0566 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0566">CVE-2022-0566 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26381">CVE-2022-26381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26383">CVE-2022-26383 at NVD</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26384">CVE-2022-26384 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26386">CVE-2022-26386 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26387">CVE-2022-26387 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26485">CVE-2022-26485 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26486">CVE-2022-26486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829623" comment="thunderbird-91.7.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1191" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1045.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1045.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829624" comment="httpd-2.4.6-97.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829625" comment="httpd-devel-2.4.6-97.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829626" comment="httpd-manual-2.4.6-97.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829627" comment="httpd-tools-2.4.6-97.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829628" comment="mod_ldap-2.4.6-97.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829629" comment="mod_proxy_html-2.4.6-97.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829630" comment="mod_session-2.4.6-97.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829631" comment="mod_ssl-2.4.6-97.el7_9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1192" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1066.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1066.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829632" comment="openssl-1.0.2k-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829633" comment="openssl-devel-1.0.2k-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829634" comment="openssl-libs-1.0.2k-25.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1193" version="1" class="patch">
	<metadata>
		<title>security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1069.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1069.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829635" comment="expat-2.1.0-14.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829636" comment="expat-devel-2.1.0-14.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829637" comment="expat-static-2.1.0-14.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1194" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-4028" ref_url="https://www.suse.com/security/cve/CVE-2021-4028/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1198.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1198.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4028/">CVE-2021-4028 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4028">CVE-2021-4028 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829638" comment="bpftool-3.10.0-1160.62.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829639" comment="kernel-3.10.0-1160.62.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829640" comment="kernel-abi-whitelists-3.10.0-1160.62.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829641" comment="kernel-debug-3.10.0-1160.62.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829644" comment="kernel-doc-3.10.0-1160.62.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829645" comment="kernel-headers-3.10.0-1160.62.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829646" comment="kernel-tools-3.10.0-1160.62.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829647" comment="kernel-tools-libs-3.10.0-1160.62.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829649" comment="perf-3.10.0-1160.62.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829650" comment="python-perf-3.10.0-1160.62.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1195" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1284.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1284.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1196">CVE-2022-1196 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829651" comment="firefox-91.8.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1196" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-1197" ref_url="https://www.suse.com/security/cve/CVE-2022-1197/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1302.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1302.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1196">CVE-2022-1196 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1197/">CVE-2022-1197 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1197">CVE-2022-1197 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28281">CVE-2022-28281 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28282">CVE-2022-28282 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28285">CVE-2022-28285 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28286">CVE-2022-28286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28289">CVE-2022-28289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829652" comment="thunderbird-91.8.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1197" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1440.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1440.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829653" comment="java-11-openjdk-11.0.15.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829654" comment="java-11-openjdk-demo-11.0.15.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829655" comment="java-11-openjdk-devel-11.0.15.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829656" comment="java-11-openjdk-headless-11.0.15.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829657" comment="java-11-openjdk-javadoc-11.0.15.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829658" comment="java-11-openjdk-javadoc-zip-11.0.15.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829659" comment="java-11-openjdk-jmods-11.0.15.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829660" comment="java-11-openjdk-src-11.0.15.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829661" comment="java-11-openjdk-static-libs-11.0.15.0.9-2.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1198" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1487.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1487.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829662" comment="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829663" comment="java-1.8.0-openjdk-accessibility-1.8.0.332.b09-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829664" comment="java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829665" comment="java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829666" comment="java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829667" comment="java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829668" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829669" comment="java-1.8.0-openjdk-src-1.8.0.332.b09-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1199" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1703.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1703.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829670" comment="firefox-91.9.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1200" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-1520" ref_url="https://www.suse.com/security/cve/CVE-2022-1520/" source="CVE"/>
		<reference ref_id="CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909/" source="CVE"/>
		<reference ref_id="CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911/" source="CVE"/>
		<reference ref_id="CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912/" source="CVE"/>
		<reference ref_id="CVE-2022-29913" ref_url="https://www.suse.com/security/cve/CVE-2022-29913/" source="CVE"/>
		<reference ref_id="CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914/" source="CVE"/>
		<reference ref_id="CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916/" source="CVE"/>
		<reference ref_id="CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:1725.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:1725.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1520/">CVE-2022-1520 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1520">CVE-2022-1520 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29913/">CVE-2022-29913 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29913">CVE-2022-29913 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829671" comment="thunderbird-91.9.0-3.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1201" version="1" class="patch">
	<metadata>
		<title>security update for gzip (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2191.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2191.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829672" comment="gzip-1.5-11.el7_9 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829672" comment="gzip-1.5-11.el7_9 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1202" version="1" class="patch">
	<metadata>
		<title>security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:2213.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:2213.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829673" comment="minizip-1.2.7-20.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829674" comment="minizip-devel-1.2.7-20.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829675" comment="zlib-1.2.7-20.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829676" comment="zlib-devel-1.2.7-20.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829677" comment="zlib-static-1.2.7-20.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1203" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4642.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4642.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829678" comment="bpftool-3.10.0-1160.66.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829679" comment="kernel-3.10.0-1160.66.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829680" comment="kernel-abi-whitelists-3.10.0-1160.66.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829681" comment="kernel-debug-3.10.0-1160.66.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829684" comment="kernel-doc-3.10.0-1160.66.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829685" comment="kernel-headers-3.10.0-1160.66.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829686" comment="kernel-tools-3.10.0-1160.66.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829687" comment="kernel-tools-libs-3.10.0-1160.66.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829689" comment="perf-3.10.0-1160.66.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829690" comment="python-perf-3.10.0-1160.66.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1204" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4729.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4729.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829691" comment="firefox-91.9.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1205" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Critical)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529/" source="CVE"/>
		<reference ref_id="CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4730.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4730.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829692" comment="thunderbird-91.9.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1206" version="1" class="patch">
	<metadata>
		<title>security update for rsyslog (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-24903" ref_url="https://www.suse.com/security/cve/CVE-2022-24903/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4803.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4803.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24903/">CVE-2022-24903 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24903">CVE-2022-24903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829693" comment="rsyslog-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829694" comment="rsyslog-crypto-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829695" comment="rsyslog-doc-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829696" comment="rsyslog-elasticsearch-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829697" comment="rsyslog-gnutls-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829698" comment="rsyslog-gssapi-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829699" comment="rsyslog-kafka-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829700" comment="rsyslog-libdbi-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829701" comment="rsyslog-mmaudit-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829702" comment="rsyslog-mmjsonparse-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829703" comment="rsyslog-mmkubernetes-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829704" comment="rsyslog-mmnormalize-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829705" comment="rsyslog-mmsnmptrapd-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829706" comment="rsyslog-mysql-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829707" comment="rsyslog-pgsql-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829708" comment="rsyslog-relp-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829709" comment="rsyslog-snmp-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829710" comment="rsyslog-udpspoof-8.24.0-57.el7_9.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829693" comment="rsyslog-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829694" comment="rsyslog-crypto-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829695" comment="rsyslog-doc-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829696" comment="rsyslog-elasticsearch-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829697" comment="rsyslog-gnutls-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829698" comment="rsyslog-gssapi-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829699" comment="rsyslog-kafka-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829700" comment="rsyslog-libdbi-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829701" comment="rsyslog-mmaudit-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829702" comment="rsyslog-mmjsonparse-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829703" comment="rsyslog-mmkubernetes-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829704" comment="rsyslog-mmnormalize-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829705" comment="rsyslog-mmsnmptrapd-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829706" comment="rsyslog-mysql-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829707" comment="rsyslog-pgsql-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829708" comment="rsyslog-relp-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829709" comment="rsyslog-snmp-8.24.0-57.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829710" comment="rsyslog-udpspoof-8.24.0-57.el7_9.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1207" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4870.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4870.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829711" comment="firefox-91.10.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1208" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-1834" ref_url="https://www.suse.com/security/cve/CVE-2022-1834/" source="CVE"/>
		<reference ref_id="CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736/" source="CVE"/>
		<reference ref_id="CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737/" source="CVE"/>
		<reference ref_id="CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738/" source="CVE"/>
		<reference ref_id="CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740/" source="CVE"/>
		<reference ref_id="CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741/" source="CVE"/>
		<reference ref_id="CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742/" source="CVE"/>
		<reference ref_id="CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4891.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4891.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1834/">CVE-2022-1834 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1834">CVE-2022-1834 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829712" comment="thunderbird-91.10.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1209" version="1" class="patch">
	<metadata>
		<title>security update for python-twisted-web (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-24801" ref_url="https://www.suse.com/security/cve/CVE-2022-24801/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:4930.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:4930.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24801/">CVE-2022-24801 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24801">CVE-2022-24801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829713" comment="python-twisted-web-12.1.0-8.el7_9 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829713" comment="python-twisted-web-12.1.0-8.el7_9 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1210" version="1" class="patch">
	<metadata>
		<title>security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5052.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5052.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829714" comment="xz-5.2.2-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829715" comment="xz-compat-libs-5.2.2-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829716" comment="xz-devel-5.2.2-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829717" comment="xz-libs-5.2.2-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829718" comment="xz-lzma-compat-5.2.2-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829714" comment="xz-5.2.2-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829715" comment="xz-compat-libs-5.2.2-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829716" comment="xz-devel-5.2.2-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829717" comment="xz-libs-5.2.2-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829718" comment="xz-lzma-compat-5.2.2-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1211" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5162.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5162.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829719" comment="postgresql-9.2.24-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829720" comment="postgresql-contrib-9.2.24-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829721" comment="postgresql-devel-9.2.24-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829722" comment="postgresql-docs-9.2.24-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829723" comment="postgresql-libs-9.2.24-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829724" comment="postgresql-plperl-9.2.24-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829725" comment="postgresql-plpython-9.2.24-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829726" comment="postgresql-pltcl-9.2.24-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829727" comment="postgresql-server-9.2.24-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829728" comment="postgresql-static-9.2.24-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829729" comment="postgresql-test-9.2.24-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829730" comment="postgresql-upgrade-9.2.24-8.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1212" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729/" source="CVE"/>
		<reference ref_id="CVE-2022-1966" ref_url="https://www.suse.com/security/cve/CVE-2022-1966/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5232.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5232.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1966/">CVE-2022-1966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1966">CVE-2022-1966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829731" comment="bpftool-3.10.0-1160.71.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829732" comment="kernel-3.10.0-1160.71.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829733" comment="kernel-abi-whitelists-3.10.0-1160.71.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829734" comment="kernel-debug-3.10.0-1160.71.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829737" comment="kernel-doc-3.10.0-1160.71.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829738" comment="kernel-headers-3.10.0-1160.71.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829739" comment="kernel-tools-3.10.0-1160.71.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829740" comment="kernel-tools-libs-3.10.0-1160.71.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829742" comment="perf-3.10.0-1160.71.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829743" comment="python-perf-3.10.0-1160.71.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1213" version="1" class="patch">
	<metadata>
		<title>security update for python-virtualenv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5234.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5234.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829744" comment="python-virtualenv-15.1.0-7.el7_9 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829744" comment="python-virtualenv-15.1.0-7.el7_9 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1214" version="1" class="patch">
	<metadata>
		<title>security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5235.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5235.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829745" comment="python-2.7.5-92.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829746" comment="python-debug-2.7.5-92.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829747" comment="python-devel-2.7.5-92.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829748" comment="python-libs-2.7.5-92.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829749" comment="python-test-2.7.5-92.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829750" comment="python-tools-2.7.5-92.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829751" comment="tkinter-2.7.5-92.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1215" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-0918" ref_url="https://www.suse.com/security/cve/CVE-2022-0918/" source="CVE"/>
		<reference ref_id="CVE-2022-0996" ref_url="https://www.suse.com/security/cve/CVE-2022-0996/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5239.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5239.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0918/">CVE-2022-0918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0918">CVE-2022-0918 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0996/">CVE-2022-0996 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0996">CVE-2022-0996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829752" comment="389-ds-base-1.3.10.2-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829753" comment="389-ds-base-devel-1.3.10.2-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829754" comment="389-ds-base-libs-1.3.10.2-16.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829755" comment="389-ds-base-snmp-1.3.10.2-16.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1216" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5479.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5479.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829756" comment="firefox-91.11.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1217" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200/" source="CVE"/>
		<reference ref_id="CVE-2022-2226" ref_url="https://www.suse.com/security/cve/CVE-2022-2226/" source="CVE"/>
		<reference ref_id="CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744/" source="CVE"/>
		<reference ref_id="CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468/" source="CVE"/>
		<reference ref_id="CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470/" source="CVE"/>
		<reference ref_id="CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472/" source="CVE"/>
		<reference ref_id="CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479/" source="CVE"/>
		<reference ref_id="CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481/" source="CVE"/>
		<reference ref_id="CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5480.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5480.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2226/">CVE-2022-2226 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2226">CVE-2022-2226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829757" comment="thunderbird-91.11.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1218" version="1" class="patch">
	<metadata>
		<title>security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-46784" ref_url="https://www.suse.com/security/cve/CVE-2021-46784/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5542.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5542.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46784/">CVE-2021-46784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46784">CVE-2021-46784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829758" comment="squid-3.5.20-17.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829759" comment="squid-migration-script-3.5.20-17.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829760" comment="squid-sysvinit-3.5.20-17.el7_9.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1219" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5687.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5687.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829761" comment="java-11-openjdk-11.0.16.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829762" comment="java-11-openjdk-demo-11.0.16.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829763" comment="java-11-openjdk-devel-11.0.16.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829764" comment="java-11-openjdk-headless-11.0.16.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829765" comment="java-11-openjdk-javadoc-11.0.16.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829766" comment="java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829767" comment="java-11-openjdk-jmods-11.0.16.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829768" comment="java-11-openjdk-src-11.0.16.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829769" comment="java-11-openjdk-static-libs-11.0.16.0.8-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1220" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540/" source="CVE"/>
		<reference ref_id="CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541/" source="CVE"/>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5698.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5698.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829770" comment="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829771" comment="java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829772" comment="java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829773" comment="java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829774" comment="java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829775" comment="java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829776" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829777" comment="java-1.8.0-openjdk-src-1.8.0.342.b07-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1221" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505/" source="CVE"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5773.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5773.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2505">CVE-2022-2505 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829778" comment="thunderbird-91.12.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1222" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505/" source="CVE"/>
		<reference ref_id="CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318/" source="CVE"/>
		<reference ref_id="CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5776.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5776.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2505">CVE-2022-2505 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829779" comment="firefox-91.12.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1223" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-2319" ref_url="https://www.suse.com/security/cve/CVE-2022-2319/" source="CVE"/>
		<reference ref_id="CVE-2022-2320" ref_url="https://www.suse.com/security/cve/CVE-2022-2320/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5905.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5905.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2319/">CVE-2022-2319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2319">CVE-2022-2319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2320/">CVE-2022-2320 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2320">CVE-2022-2320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829780" comment="xorg-x11-server-Xdmx-1.20.4-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829781" comment="xorg-x11-server-Xephyr-1.20.4-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829782" comment="xorg-x11-server-Xnest-1.20.4-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829783" comment="xorg-x11-server-Xorg-1.20.4-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829784" comment="xorg-x11-server-Xvfb-1.20.4-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829785" comment="xorg-x11-server-Xwayland-1.20.4-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829786" comment="xorg-x11-server-common-1.20.4-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829787" comment="xorg-x11-server-devel-1.20.4-18.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829788" comment="xorg-x11-server-source-1.20.4-18.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1224" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123/" source="CVE"/>
		<reference ref_id="CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125/" source="CVE"/>
		<reference ref_id="CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:5937.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:5937.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829789" comment="bpftool-3.10.0-1160.76.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829790" comment="kernel-3.10.0-1160.76.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829791" comment="kernel-abi-whitelists-3.10.0-1160.76.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829792" comment="kernel-debug-3.10.0-1160.76.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829795" comment="kernel-doc-3.10.0-1160.76.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829796" comment="kernel-headers-3.10.0-1160.76.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829797" comment="kernel-tools-3.10.0-1160.76.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829798" comment="kernel-tools-libs-3.10.0-1160.76.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829800" comment="perf-3.10.0-1160.76.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829801" comment="python-perf-3.10.0-1160.76.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1225" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-2526" ref_url="https://www.suse.com/security/cve/CVE-2022-2526/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6160.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6160.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2526/">CVE-2022-2526 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2526">CVE-2022-2526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829802" comment="libgudev1-219-78.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829803" comment="libgudev1-devel-219-78.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829804" comment="systemd-219-78.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829805" comment="systemd-devel-219-78.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829806" comment="systemd-journal-gateway-219-78.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829807" comment="systemd-libs-219-78.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829808" comment="systemd-networkd-219-78.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829809" comment="systemd-python-219-78.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829810" comment="systemd-resolved-219-78.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829811" comment="systemd-sysv-219-78.el7_9.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1226" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38476" ref_url="https://www.suse.com/security/cve/CVE-2022-38476/" source="CVE"/>
		<reference ref_id="CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6169.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6169.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38476/">CVE-2022-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38476">CVE-2022-38476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38477">CVE-2022-38477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829812" comment="thunderbird-91.13.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1227" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-29154" ref_url="https://www.suse.com/security/cve/CVE-2022-29154/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6170.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6170.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29154/">CVE-2022-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29154">CVE-2022-29154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829813" comment="rsync-3.1.2-11.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1228" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472/" source="CVE"/>
		<reference ref_id="CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473/" source="CVE"/>
		<reference ref_id="CVE-2022-38476" ref_url="https://www.suse.com/security/cve/CVE-2022-38476/" source="CVE"/>
		<reference ref_id="CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477/" source="CVE"/>
		<reference ref_id="CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6179.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6179.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38476/">CVE-2022-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38476">CVE-2022-38476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38477">CVE-2022-38477 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829814" comment="firefox-91.13.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1229" version="1" class="patch">
	<metadata>
		<title>security update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-31676" ref_url="https://www.suse.com/security/cve/CVE-2022-31676/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6381.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6381.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31676/">CVE-2022-31676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31676">CVE-2022-31676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829815" comment="open-vm-tools-11.0.5-3.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829816" comment="open-vm-tools-desktop-11.0.5-3.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829817" comment="open-vm-tools-devel-11.0.5-3.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829818" comment="open-vm-tools-test-11.0.5-3.el7_9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1230" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-3032" ref_url="https://www.suse.com/security/cve/CVE-2022-3032/" source="CVE"/>
		<reference ref_id="CVE-2022-3033" ref_url="https://www.suse.com/security/cve/CVE-2022-3033/" source="CVE"/>
		<reference ref_id="CVE-2022-3034" ref_url="https://www.suse.com/security/cve/CVE-2022-3034/" source="CVE"/>
		<reference ref_id="CVE-2022-36059" ref_url="https://www.suse.com/security/cve/CVE-2022-36059/" source="CVE"/>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6710.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6710.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3032/">CVE-2022-3032 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3032">CVE-2022-3032 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3033/">CVE-2022-3033 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3033">CVE-2022-3033 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3034/">CVE-2022-3034 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3034">CVE-2022-3034 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36059/">CVE-2022-36059 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36059">CVE-2022-36059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829819" comment="thunderbird-102.3.0-3.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1231" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956/" source="CVE"/>
		<reference ref_id="CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957/" source="CVE"/>
		<reference ref_id="CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958/" source="CVE"/>
		<reference ref_id="CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959/" source="CVE"/>
		<reference ref_id="CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960/" source="CVE"/>
		<reference ref_id="CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6711.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6711.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829820" comment="firefox-102.3.0-6.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1232" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-38177" ref_url="https://www.suse.com/security/cve/CVE-2022-38177/" source="CVE"/>
		<reference ref_id="CVE-2022-38178" ref_url="https://www.suse.com/security/cve/CVE-2022-38178/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6765.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6765.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38177/">CVE-2022-38177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38177">CVE-2022-38177 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38178/">CVE-2022-38178 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38178">CVE-2022-38178 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829821" comment="bind-9.11.4-26.P2.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829822" comment="bind-chroot-9.11.4-26.P2.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829823" comment="bind-devel-9.11.4-26.P2.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829824" comment="bind-export-devel-9.11.4-26.P2.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829825" comment="bind-export-libs-9.11.4-26.P2.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829826" comment="bind-libs-9.11.4-26.P2.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829827" comment="bind-libs-lite-9.11.4-26.P2.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829828" comment="bind-license-9.11.4-26.P2.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829829" comment="bind-lite-devel-9.11.4-26.P2.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829830" comment="bind-pkcs11-9.11.4-26.P2.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829831" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829832" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829833" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829834" comment="bind-sdb-9.11.4-26.P2.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829835" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829836" comment="bind-utils-9.11.4-26.P2.el7_9.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1233" version="1" class="patch">
	<metadata>
		<title>security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-41318" ref_url="https://www.suse.com/security/cve/CVE-2022-41318/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6815.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6815.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-41318/">CVE-2022-41318 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41318">CVE-2022-41318 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829837" comment="squid-3.5.20-17.el7_9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829838" comment="squid-migration-script-3.5.20-17.el7_9.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829839" comment="squid-sysvinit-3.5.20-17.el7_9.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1234" version="1" class="patch">
	<metadata>
		<title>security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6834.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6834.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829840" comment="expat-2.1.0-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829841" comment="expat-devel-2.1.0-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829842" comment="expat-static-2.1.0-15.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829840" comment="expat-2.1.0-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829841" comment="expat-devel-2.1.0-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829842" comment="expat-static-2.1.0-15.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1235" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6997.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6997.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829843" comment="firefox-102.3.0-7.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1236" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:6998.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:6998.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829844" comment="thunderbird-102.3.0-4.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1237" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7002.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7002.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829845" comment="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829846" comment="java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829847" comment="java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829848" comment="java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829849" comment="java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829850" comment="java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829851" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829852" comment="java-1.8.0-openjdk-src-1.8.0.352.b08-2.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1238" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618/" source="CVE"/>
		<reference ref_id="CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619/" source="CVE"/>
		<reference ref_id="CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624/" source="CVE"/>
		<reference ref_id="CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626/" source="CVE"/>
		<reference ref_id="CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628/" source="CVE"/>
		<reference ref_id="CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7008.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7008.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39399">CVE-2022-39399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829853" comment="java-11-openjdk-11.0.17.0.8-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829854" comment="java-11-openjdk-demo-11.0.17.0.8-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829855" comment="java-11-openjdk-devel-11.0.17.0.8-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829856" comment="java-11-openjdk-headless-11.0.17.0.8-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829857" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829858" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829859" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829860" comment="java-11-openjdk-src-11.0.17.0.8-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829861" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1239" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927/" source="CVE"/>
		<reference ref_id="CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928/" source="CVE"/>
		<reference ref_id="CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929/" source="CVE"/>
		<reference ref_id="CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7069.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7069.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42927">CVE-2022-42927 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42928">CVE-2022-42928 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42929">CVE-2022-42929 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42932">CVE-2022-42932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829862" comment="firefox-102.4.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1240" version="1" class="patch">
	<metadata>
		<title>security update for pki-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-2393" ref_url="https://www.suse.com/security/cve/CVE-2022-2393/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7086.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7086.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2393/">CVE-2022-2393 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2393">CVE-2022-2393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829863" comment="pki-base-10.5.18-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829864" comment="pki-base-java-10.5.18-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829865" comment="pki-ca-10.5.18-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829866" comment="pki-javadoc-10.5.18-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829867" comment="pki-kra-10.5.18-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829868" comment="pki-server-10.5.18-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829869" comment="pki-symkey-10.5.18-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829870" comment="pki-tools-10.5.18-23.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1241" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-2850" ref_url="https://www.suse.com/security/cve/CVE-2022-2850/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7087.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7087.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2850/">CVE-2022-2850 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2850">CVE-2022-2850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829871" comment="389-ds-base-1.3.10.2-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829872" comment="389-ds-base-devel-1.3.10.2-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829873" comment="389-ds-base-libs-1.3.10.2-17.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829874" comment="389-ds-base-snmp-1.3.10.2-17.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1242" version="1" class="patch">
	<metadata>
		<title>security update for libksba (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-3515" ref_url="https://www.suse.com/security/cve/CVE-2022-3515/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7088.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7088.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3515/">CVE-2022-3515 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3515">CVE-2022-3515 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829875" comment="libksba-1.3.0-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829876" comment="libksba-devel-1.3.0-6.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1243" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-39236" ref_url="https://www.suse.com/security/cve/CVE-2022-39236/" source="CVE"/>
		<reference ref_id="CVE-2022-39249" ref_url="https://www.suse.com/security/cve/CVE-2022-39249/" source="CVE"/>
		<reference ref_id="CVE-2022-39250" ref_url="https://www.suse.com/security/cve/CVE-2022-39250/" source="CVE"/>
		<reference ref_id="CVE-2022-39251" ref_url="https://www.suse.com/security/cve/CVE-2022-39251/" source="CVE"/>
		<reference ref_id="CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927/" source="CVE"/>
		<reference ref_id="CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928/" source="CVE"/>
		<reference ref_id="CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929/" source="CVE"/>
		<reference ref_id="CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7184.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7184.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39236/">CVE-2022-39236 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39236">CVE-2022-39236 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39249/">CVE-2022-39249 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39249">CVE-2022-39249 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39250/">CVE-2022-39250 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39250">CVE-2022-39250 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39251/">CVE-2022-39251 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39251">CVE-2022-39251 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42927">CVE-2022-42927 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42928">CVE-2022-42928 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42929">CVE-2022-42929 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42932">CVE-2022-42932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829877" comment="thunderbird-102.4.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1244" version="1" class="patch">
	<metadata>
		<title>security update for device-mapper-multipath (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-41974" ref_url="https://www.suse.com/security/cve/CVE-2022-41974/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7186.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7186.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41974/">CVE-2022-41974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41974">CVE-2022-41974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829878" comment="device-mapper-multipath-0.4.9-136.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829879" comment="device-mapper-multipath-devel-0.4.9-136.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829880" comment="device-mapper-multipath-libs-0.4.9-136.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829881" comment="device-mapper-multipath-sysvinit-0.4.9-136.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829882" comment="kpartx-0.4.9-136.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829883" comment="libdmmp-0.4.9-136.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829884" comment="libdmmp-devel-0.4.9-136.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829878" comment="device-mapper-multipath-0.4.9-136.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829879" comment="device-mapper-multipath-devel-0.4.9-136.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829880" comment="device-mapper-multipath-libs-0.4.9-136.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829881" comment="device-mapper-multipath-sysvinit-0.4.9-136.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829882" comment="kpartx-0.4.9-136.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829883" comment="libdmmp-0.4.9-136.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829884" comment="libdmmp-devel-0.4.9-136.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1245" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-23816" ref_url="https://www.suse.com/security/cve/CVE-2022-23816/" source="CVE"/>
		<reference ref_id="CVE-2022-23825" ref_url="https://www.suse.com/security/cve/CVE-2022-23825/" source="CVE"/>
		<reference ref_id="CVE-2022-2588" ref_url="https://www.suse.com/security/cve/CVE-2022-2588/" source="CVE"/>
		<reference ref_id="CVE-2022-26373" ref_url="https://www.suse.com/security/cve/CVE-2022-26373/" source="CVE"/>
		<reference ref_id="CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900/" source="CVE"/>
		<reference ref_id="CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7337.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7337.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23816/">CVE-2022-23816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-23816">CVE-2022-23816 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23825/">CVE-2022-23825 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23825">CVE-2022-23825 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2588/">CVE-2022-2588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2588">CVE-2022-2588 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26373/">CVE-2022-26373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26373">CVE-2022-26373 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829885" comment="bpftool-3.10.0-1160.80.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829886" comment="kernel-3.10.0-1160.80.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829887" comment="kernel-abi-whitelists-3.10.0-1160.80.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829888" comment="kernel-debug-3.10.0-1160.80.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829891" comment="kernel-doc-3.10.0-1160.80.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829892" comment="kernel-headers-3.10.0-1160.80.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829893" comment="kernel-tools-3.10.0-1160.80.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829894" comment="kernel-tools-libs-3.10.0-1160.80.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829896" comment="perf-3.10.0-1160.80.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829897" comment="python-perf-3.10.0-1160.80.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1246" version="1" class="patch">
	<metadata>
		<title>security update for php-pear (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-28948" ref_url="https://www.suse.com/security/cve/CVE-2020-28948/" source="CVE"/>
		<reference ref_id="CVE-2020-28949" ref_url="https://www.suse.com/security/cve/CVE-2020-28949/" source="CVE"/>
		<reference ref_id="CVE-2020-36193" ref_url="https://www.suse.com/security/cve/CVE-2020-36193/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7340.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7340.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28948/">CVE-2020-28948 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28948">CVE-2020-28948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28949/">CVE-2020-28949 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28949">CVE-2020-28949 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-36193/">CVE-2020-36193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36193">CVE-2020-36193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829898" comment="php-pear-1.9.4-23.el7_9 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829898" comment="php-pear-1.9.4-23.el7_9 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1247" version="1" class="patch">
	<metadata>
		<title>security update for pcs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2019-11358" ref_url="https://www.suse.com/security/cve/CVE-2019-11358/" source="CVE"/>
		<reference ref_id="CVE-2022-30123" ref_url="https://www.suse.com/security/cve/CVE-2022-30123/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:7343.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:7343.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11358/">CVE-2019-11358 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11358">CVE-2019-11358 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30123/">CVE-2022-30123 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30123">CVE-2022-30123 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829899" comment="pcs-0.9.169-3.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829900" comment="pcs-snmp-0.9.169-3.el7_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1248" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-3550" ref_url="https://www.suse.com/security/cve/CVE-2022-3550/" source="CVE"/>
		<reference ref_id="CVE-2022-3551" ref_url="https://www.suse.com/security/cve/CVE-2022-3551/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8491.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8491.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3550/">CVE-2022-3550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3550">CVE-2022-3550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3551/">CVE-2022-3551 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3551">CVE-2022-3551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829901" comment="xorg-x11-server-Xdmx-1.20.4-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829902" comment="xorg-x11-server-Xephyr-1.20.4-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829903" comment="xorg-x11-server-Xnest-1.20.4-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829904" comment="xorg-x11-server-Xorg-1.20.4-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829905" comment="xorg-x11-server-Xvfb-1.20.4-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829906" comment="xorg-x11-server-Xwayland-1.20.4-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829907" comment="xorg-x11-server-common-1.20.4-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829908" comment="xorg-x11-server-devel-1.20.4-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829909" comment="xorg-x11-server-source-1.20.4-19.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1249" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8552.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8552.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829910" comment="firefox-102.5.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1250" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403/" source="CVE"/>
		<reference ref_id="CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404/" source="CVE"/>
		<reference ref_id="CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405/" source="CVE"/>
		<reference ref_id="CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406/" source="CVE"/>
		<reference ref_id="CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408/" source="CVE"/>
		<reference ref_id="CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409/" source="CVE"/>
		<reference ref_id="CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410/" source="CVE"/>
		<reference ref_id="CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411/" source="CVE"/>
		<reference ref_id="CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412/" source="CVE"/>
		<reference ref_id="CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416/" source="CVE"/>
		<reference ref_id="CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418/" source="CVE"/>
		<reference ref_id="CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420/" source="CVE"/>
		<reference ref_id="CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8555.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8555.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829911" comment="thunderbird-102.5.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1251" version="1" class="patch">
	<metadata>
		<title>security update for hsqldb (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-41853" ref_url="https://www.suse.com/security/cve/CVE-2022-41853/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8560.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8560.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41853/">CVE-2022-41853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41853">CVE-2022-41853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829912" comment="hsqldb-1.8.1.3-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829913" comment="hsqldb-demo-1.8.1.3-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829914" comment="hsqldb-javadoc-1.8.1.3-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829915" comment="hsqldb-manual-1.8.1.3-15.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829912" comment="hsqldb-1.8.1.3-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829913" comment="hsqldb-demo-1.8.1.3-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829914" comment="hsqldb-javadoc-1.8.1.3-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829915" comment="hsqldb-manual-1.8.1.3-15.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1252" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8640.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8640.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829916" comment="krb5-devel-1.15.1-55.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829917" comment="krb5-libs-1.15.1-55.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829918" comment="krb5-pkinit-1.15.1-55.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829919" comment="krb5-server-1.15.1-55.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829920" comment="krb5-server-ldap-1.15.1-55.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829921" comment="krb5-workstation-1.15.1-55.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829922" comment="libkadm5-1.15.1-55.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829916" comment="krb5-devel-1.15.1-55.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829917" comment="krb5-libs-1.15.1-55.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829918" comment="krb5-pkinit-1.15.1-55.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829919" comment="krb5-server-1.15.1-55.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829920" comment="krb5-server-ldap-1.15.1-55.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829921" comment="krb5-workstation-1.15.1-55.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829922" comment="libkadm5-1.15.1-55.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1253" version="1" class="patch">
	<metadata>
		<title>security update for pki-core (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-2414" ref_url="https://www.suse.com/security/cve/CVE-2022-2414/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8799.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8799.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2414/">CVE-2022-2414 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2414">CVE-2022-2414 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829923" comment="pki-base-10.5.18-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829924" comment="pki-base-java-10.5.18-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829925" comment="pki-ca-10.5.18-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829926" comment="pki-javadoc-10.5.18-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829927" comment="pki-kra-10.5.18-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829928" comment="pki-server-10.5.18-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829929" comment="pki-symkey-10.5.18-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829930" comment="pki-tools-10.5.18-24.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1254" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-28733" ref_url="https://www.suse.com/security/cve/CVE-2022-28733/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8900.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8900.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28733/">CVE-2022-28733 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829931" comment="grub2-2.02-0.87.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829932" comment="grub2-common-2.02-0.87.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829933" comment="grub2-efi-ia32-2.02-0.87.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829934" comment="grub2-efi-ia32-cdboot-2.02-0.87.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829935" comment="grub2-efi-ia32-modules-2.02-0.87.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829936" comment="grub2-efi-x64-2.02-0.87.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829937" comment="grub2-efi-x64-cdboot-2.02-0.87.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829938" comment="grub2-efi-x64-modules-2.02-0.87.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829939" comment="grub2-pc-2.02-0.87.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829940" comment="grub2-pc-modules-2.02-0.87.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829941" comment="grub2-tools-2.02-0.87.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829942" comment="grub2-tools-extra-2.02-0.87.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829943" comment="grub2-tools-minimal-2.02-0.87.el7_9.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1255" version="1" class="patch">
	<metadata>
		<title>security update for bcel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-42920" ref_url="https://www.suse.com/security/cve/CVE-2022-42920/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:8958.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:8958.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42920/">CVE-2022-42920 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42920">CVE-2022-42920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829944" comment="bcel-5.2-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829945" comment="bcel-javadoc-5.2-19.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829944" comment="bcel-5.2-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829945" comment="bcel-javadoc-5.2-19.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1256" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880/" source="CVE"/>
		<reference ref_id="CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881/" source="CVE"/>
		<reference ref_id="CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:9072.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:9072.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46880">CVE-2022-46880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46881">CVE-2022-46881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46882">CVE-2022-46882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829946" comment="firefox-102.6.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1257" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-45414" ref_url="https://www.suse.com/security/cve/CVE-2022-45414/" source="CVE"/>
		<reference ref_id="CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872/" source="CVE"/>
		<reference ref_id="CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874/" source="CVE"/>
		<reference ref_id="CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878/" source="CVE"/>
		<reference ref_id="CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880/" source="CVE"/>
		<reference ref_id="CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881/" source="CVE"/>
		<reference ref_id="CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2022:9079.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2022:9079.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-45414/">CVE-2022-45414 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45414">CVE-2022-45414 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46880">CVE-2022-46880 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46881">CVE-2022-46881 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46882">CVE-2022-46882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829947" comment="thunderbird-102.6.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1258" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283/" source="CVE"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<reference ref_id="CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341/" source="CVE"/>
		<reference ref_id="CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342/" source="CVE"/>
		<reference ref_id="CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343/" source="CVE"/>
		<reference ref_id="CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0045.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0045.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341">CVE-2022-46341 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829948" comment="tigervnc-1.8.0-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829949" comment="tigervnc-icons-1.8.0-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829950" comment="tigervnc-license-1.8.0-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829951" comment="tigervnc-server-1.8.0-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829952" comment="tigervnc-server-applet-1.8.0-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829953" comment="tigervnc-server-minimal-1.8.0-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829954" comment="tigervnc-server-module-1.8.0-23.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1259" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283/" source="CVE"/>
		<reference ref_id="CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340/" source="CVE"/>
		<reference ref_id="CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341/" source="CVE"/>
		<reference ref_id="CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342/" source="CVE"/>
		<reference ref_id="CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343/" source="CVE"/>
		<reference ref_id="CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0046.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0046.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341">CVE-2022-46341 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829955" comment="xorg-x11-server-Xdmx-1.20.4-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829956" comment="xorg-x11-server-Xephyr-1.20.4-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829957" comment="xorg-x11-server-Xnest-1.20.4-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829958" comment="xorg-x11-server-Xorg-1.20.4-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829959" comment="xorg-x11-server-Xvfb-1.20.4-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829960" comment="xorg-x11-server-Xwayland-1.20.4-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829961" comment="xorg-x11-server-common-1.20.4-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829962" comment="xorg-x11-server-devel-1.20.4-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829963" comment="xorg-x11-server-source-1.20.4-21.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1260" version="1" class="patch">
	<metadata>
		<title>security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-2132" ref_url="https://www.suse.com/security/cve/CVE-2022-2132/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0167.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0167.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2132/">CVE-2022-2132 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2132">CVE-2022-2132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829964" comment="dpdk-18.11.8-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829965" comment="dpdk-devel-18.11.8-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829966" comment="dpdk-doc-18.11.8-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829967" comment="dpdk-tools-18.11.8-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829964" comment="dpdk-18.11.8-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829965" comment="dpdk-devel-18.11.8-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829966" comment="dpdk-doc-18.11.8-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829967" comment="dpdk-tools-18.11.8-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1261" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0195.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0195.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829968" comment="java-11-openjdk-11.0.18.0.10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829969" comment="java-11-openjdk-demo-11.0.18.0.10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829970" comment="java-11-openjdk-devel-11.0.18.0.10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829971" comment="java-11-openjdk-headless-11.0.18.0.10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829972" comment="java-11-openjdk-javadoc-11.0.18.0.10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829973" comment="java-11-openjdk-javadoc-zip-11.0.18.0.10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829974" comment="java-11-openjdk-jmods-11.0.18.0.10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829975" comment="java-11-openjdk-src-11.0.18.0.10-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829976" comment="java-11-openjdk-static-libs-11.0.18.0.10-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1262" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-21830" ref_url="https://www.suse.com/security/cve/CVE-2023-21830/" source="CVE"/>
		<reference ref_id="CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0203.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0203.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21830/">CVE-2023-21830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21830">CVE-2023-21830 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829977" comment="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829978" comment="java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829979" comment="java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829980" comment="java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829981" comment="java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829982" comment="java-1.8.0-openjdk-javadoc-1.8.0.362.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829983" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829984" comment="java-1.8.0-openjdk-src-1.8.0.362.b08-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1263" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-22809" ref_url="https://www.suse.com/security/cve/CVE-2023-22809/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0291.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0291.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22809/">CVE-2023-22809 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22809">CVE-2023-22809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829985" comment="sudo-1.8.23-10.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829986" comment="sudo-devel-1.8.23-10.el7_9.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829985" comment="sudo-1.8.23-10.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829986" comment="sudo-devel-1.8.23-10.el7_9.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1264" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-46871" ref_url="https://www.suse.com/security/cve/CVE-2022-46871/" source="CVE"/>
		<reference ref_id="CVE-2022-46877" ref_url="https://www.suse.com/security/cve/CVE-2022-46877/" source="CVE"/>
		<reference ref_id="CVE-2023-23598" ref_url="https://www.suse.com/security/cve/CVE-2023-23598/" source="CVE"/>
		<reference ref_id="CVE-2023-23599" ref_url="https://www.suse.com/security/cve/CVE-2023-23599/" source="CVE"/>
		<reference ref_id="CVE-2023-23601" ref_url="https://www.suse.com/security/cve/CVE-2023-23601/" source="CVE"/>
		<reference ref_id="CVE-2023-23602" ref_url="https://www.suse.com/security/cve/CVE-2023-23602/" source="CVE"/>
		<reference ref_id="CVE-2023-23603" ref_url="https://www.suse.com/security/cve/CVE-2023-23603/" source="CVE"/>
		<reference ref_id="CVE-2023-23605" ref_url="https://www.suse.com/security/cve/CVE-2023-23605/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0296.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0296.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46871/">CVE-2022-46871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46871">CVE-2022-46871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46877/">CVE-2022-46877 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46877">CVE-2022-46877 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23598/">CVE-2023-23598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23598">CVE-2023-23598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23599/">CVE-2023-23599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23599">CVE-2023-23599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23601/">CVE-2023-23601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23601">CVE-2023-23601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23602/">CVE-2023-23602 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23602">CVE-2023-23602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23603/">CVE-2023-23603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23603">CVE-2023-23603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23605/">CVE-2023-23605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23605">CVE-2023-23605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829987" comment="firefox-102.7.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1265" version="1" class="patch">
	<metadata>
		<title>security update for libXpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-4883" ref_url="https://www.suse.com/security/cve/CVE-2022-4883/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0377.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0377.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4883/">CVE-2022-4883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4883">CVE-2022-4883 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829988" comment="libXpm-3.5.12-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829989" comment="libXpm-devel-3.5.12-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829988" comment="libXpm-3.5.12-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829989" comment="libXpm-devel-3.5.12-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1266" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2022-2964" ref_url="https://www.suse.com/security/cve/CVE-2022-2964/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0399.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0399.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26401">CVE-2021-26401 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2964/">CVE-2022-2964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2964">CVE-2022-2964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009829990" comment="bpftool-3.10.0-1160.83.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829991" comment="kernel-3.10.0-1160.83.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829992" comment="kernel-abi-whitelists-3.10.0-1160.83.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829993" comment="kernel-debug-3.10.0-1160.83.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829996" comment="kernel-doc-3.10.0-1160.83.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829997" comment="kernel-headers-3.10.0-1160.83.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829998" comment="kernel-tools-3.10.0-1160.83.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009829999" comment="kernel-tools-libs-3.10.0-1160.83.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830001" comment="perf-3.10.0-1160.83.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830002" comment="python-perf-3.10.0-1160.83.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1267" version="1" class="patch">
	<metadata>
		<title>security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="CVE-2022-2795" ref_url="https://www.suse.com/security/cve/CVE-2022-2795/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0402.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0402.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2795/">CVE-2022-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2795">CVE-2022-2795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830003" comment="bind-9.11.4-26.P2.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830004" comment="bind-chroot-9.11.4-26.P2.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830005" comment="bind-devel-9.11.4-26.P2.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830006" comment="bind-export-devel-9.11.4-26.P2.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830007" comment="bind-export-libs-9.11.4-26.P2.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830008" comment="bind-libs-9.11.4-26.P2.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830009" comment="bind-libs-lite-9.11.4-26.P2.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830010" comment="bind-license-9.11.4-26.P2.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830011" comment="bind-lite-devel-9.11.4-26.P2.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830012" comment="bind-pkcs11-9.11.4-26.P2.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830013" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830014" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830015" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830016" comment="bind-sdb-9.11.4-26.P2.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830017" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830018" comment="bind-utils-9.11.4-26.P2.el7_9.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1268" version="1" class="patch">
	<metadata>
		<title>security update for sssd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-4254" ref_url="https://www.suse.com/security/cve/CVE-2022-4254/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0403.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0403.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4254/">CVE-2022-4254 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4254">CVE-2022-4254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830019" comment="libipa_hbac-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830020" comment="libipa_hbac-devel-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830021" comment="libsss_autofs-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830022" comment="libsss_certmap-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830023" comment="libsss_certmap-devel-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830024" comment="libsss_idmap-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830025" comment="libsss_idmap-devel-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830026" comment="libsss_nss_idmap-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830027" comment="libsss_nss_idmap-devel-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830028" comment="libsss_simpleifp-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830029" comment="libsss_simpleifp-devel-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830030" comment="libsss_sudo-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830031" comment="python-libipa_hbac-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830032" comment="python-libsss_nss_idmap-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830033" comment="python-sss-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830034" comment="python-sss-murmur-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830035" comment="python-sssdconfig-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830036" comment="sssd-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830037" comment="sssd-ad-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830038" comment="sssd-client-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830039" comment="sssd-common-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830040" comment="sssd-common-pac-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830041" comment="sssd-dbus-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830042" comment="sssd-ipa-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830043" comment="sssd-kcm-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830044" comment="sssd-krb5-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830045" comment="sssd-krb5-common-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830046" comment="sssd-ldap-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830047" comment="sssd-libwbclient-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830048" comment="sssd-libwbclient-devel-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830049" comment="sssd-polkit-rules-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830050" comment="sssd-proxy-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830051" comment="sssd-tools-1.16.5-10.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830052" comment="sssd-winbind-idmap-1.16.5-10.el7_9.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1269" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-46871" ref_url="https://www.suse.com/security/cve/CVE-2022-46871/" source="CVE"/>
		<reference ref_id="CVE-2022-46877" ref_url="https://www.suse.com/security/cve/CVE-2022-46877/" source="CVE"/>
		<reference ref_id="CVE-2023-23598" ref_url="https://www.suse.com/security/cve/CVE-2023-23598/" source="CVE"/>
		<reference ref_id="CVE-2023-23599" ref_url="https://www.suse.com/security/cve/CVE-2023-23599/" source="CVE"/>
		<reference ref_id="CVE-2023-23601" ref_url="https://www.suse.com/security/cve/CVE-2023-23601/" source="CVE"/>
		<reference ref_id="CVE-2023-23602" ref_url="https://www.suse.com/security/cve/CVE-2023-23602/" source="CVE"/>
		<reference ref_id="CVE-2023-23603" ref_url="https://www.suse.com/security/cve/CVE-2023-23603/" source="CVE"/>
		<reference ref_id="CVE-2023-23605" ref_url="https://www.suse.com/security/cve/CVE-2023-23605/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0456.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0456.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46871/">CVE-2022-46871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46871">CVE-2022-46871 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46877/">CVE-2022-46877 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46877">CVE-2022-46877 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23598/">CVE-2023-23598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23598">CVE-2023-23598 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23599/">CVE-2023-23599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23599">CVE-2023-23599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23601/">CVE-2023-23601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23601">CVE-2023-23601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23602/">CVE-2023-23602 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23602">CVE-2023-23602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23603/">CVE-2023-23603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23603">CVE-2023-23603 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23605/">CVE-2023-23605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23605">CVE-2023-23605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830053" comment="thunderbird-102.7.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1270" version="1" class="patch">
	<metadata>
		<title>security update for libksba (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-47629" ref_url="https://www.suse.com/security/cve/CVE-2022-47629/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0530.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0530.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47629/">CVE-2022-47629 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47629">CVE-2022-47629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830054" comment="libksba-1.3.0-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830055" comment="libksba-devel-1.3.0-7.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830054" comment="libksba-1.3.0-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830055" comment="libksba-devel-1.3.0-7.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1271" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-0430" ref_url="https://www.suse.com/security/cve/CVE-2023-0430/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0600.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0600.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0430/">CVE-2023-0430 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0430">CVE-2023-0430 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830056" comment="thunderbird-102.7.1-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1272" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-0494" ref_url="https://www.suse.com/security/cve/CVE-2023-0494/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0675.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0675.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0494/">CVE-2023-0494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0494">CVE-2023-0494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830057" comment="tigervnc-1.8.0-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830058" comment="tigervnc-icons-1.8.0-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830059" comment="tigervnc-license-1.8.0-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830060" comment="tigervnc-server-1.8.0-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830061" comment="tigervnc-server-applet-1.8.0-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830062" comment="tigervnc-server-minimal-1.8.0-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830063" comment="tigervnc-server-module-1.8.0-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830064" comment="xorg-x11-server-Xdmx-1.20.4-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830065" comment="xorg-x11-server-Xephyr-1.20.4-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830066" comment="xorg-x11-server-Xnest-1.20.4-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830067" comment="xorg-x11-server-Xorg-1.20.4-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830068" comment="xorg-x11-server-Xvfb-1.20.4-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830069" comment="xorg-x11-server-Xwayland-1.20.4-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830070" comment="xorg-x11-server-common-1.20.4-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830071" comment="xorg-x11-server-devel-1.20.4-22.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830072" comment="xorg-x11-server-source-1.20.4-22.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1273" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767/" source="CVE"/>
		<reference ref_id="CVE-2023-25728" ref_url="https://www.suse.com/security/cve/CVE-2023-25728/" source="CVE"/>
		<reference ref_id="CVE-2023-25729" ref_url="https://www.suse.com/security/cve/CVE-2023-25729/" source="CVE"/>
		<reference ref_id="CVE-2023-25730" ref_url="https://www.suse.com/security/cve/CVE-2023-25730/" source="CVE"/>
		<reference ref_id="CVE-2023-25732" ref_url="https://www.suse.com/security/cve/CVE-2023-25732/" source="CVE"/>
		<reference ref_id="CVE-2023-25735" ref_url="https://www.suse.com/security/cve/CVE-2023-25735/" source="CVE"/>
		<reference ref_id="CVE-2023-25737" ref_url="https://www.suse.com/security/cve/CVE-2023-25737/" source="CVE"/>
		<reference ref_id="CVE-2023-25739" ref_url="https://www.suse.com/security/cve/CVE-2023-25739/" source="CVE"/>
		<reference ref_id="CVE-2023-25742" ref_url="https://www.suse.com/security/cve/CVE-2023-25742/" source="CVE"/>
		<reference ref_id="CVE-2023-25743" ref_url="https://www.suse.com/security/cve/CVE-2023-25743/" source="CVE"/>
		<reference ref_id="CVE-2023-25744" ref_url="https://www.suse.com/security/cve/CVE-2023-25744/" source="CVE"/>
		<reference ref_id="CVE-2023-25746" ref_url="https://www.suse.com/security/cve/CVE-2023-25746/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0812.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0812.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25728/">CVE-2023-25728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25728">CVE-2023-25728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25729/">CVE-2023-25729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25729">CVE-2023-25729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25730/">CVE-2023-25730 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25730">CVE-2023-25730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25732/">CVE-2023-25732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25732">CVE-2023-25732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25735/">CVE-2023-25735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25735">CVE-2023-25735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25737/">CVE-2023-25737 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25737">CVE-2023-25737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25739/">CVE-2023-25739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25739">CVE-2023-25739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25742/">CVE-2023-25742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25742">CVE-2023-25742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25743/">CVE-2023-25743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25743">CVE-2023-25743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25744/">CVE-2023-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25744">CVE-2023-25744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25746/">CVE-2023-25746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25746">CVE-2023-25746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830073" comment="firefox-102.8.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1274" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-0616" ref_url="https://www.suse.com/security/cve/CVE-2023-0616/" source="CVE"/>
		<reference ref_id="CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767/" source="CVE"/>
		<reference ref_id="CVE-2023-25728" ref_url="https://www.suse.com/security/cve/CVE-2023-25728/" source="CVE"/>
		<reference ref_id="CVE-2023-25729" ref_url="https://www.suse.com/security/cve/CVE-2023-25729/" source="CVE"/>
		<reference ref_id="CVE-2023-25730" ref_url="https://www.suse.com/security/cve/CVE-2023-25730/" source="CVE"/>
		<reference ref_id="CVE-2023-25732" ref_url="https://www.suse.com/security/cve/CVE-2023-25732/" source="CVE"/>
		<reference ref_id="CVE-2023-25735" ref_url="https://www.suse.com/security/cve/CVE-2023-25735/" source="CVE"/>
		<reference ref_id="CVE-2023-25737" ref_url="https://www.suse.com/security/cve/CVE-2023-25737/" source="CVE"/>
		<reference ref_id="CVE-2023-25739" ref_url="https://www.suse.com/security/cve/CVE-2023-25739/" source="CVE"/>
		<reference ref_id="CVE-2023-25742" ref_url="https://www.suse.com/security/cve/CVE-2023-25742/" source="CVE"/>
		<reference ref_id="CVE-2023-25743" ref_url="https://www.suse.com/security/cve/CVE-2023-25743/" source="CVE"/>
		<reference ref_id="CVE-2023-25744" ref_url="https://www.suse.com/security/cve/CVE-2023-25744/" source="CVE"/>
		<reference ref_id="CVE-2023-25746" ref_url="https://www.suse.com/security/cve/CVE-2023-25746/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0817.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0817.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0616/">CVE-2023-0616 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0616">CVE-2023-0616 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25728/">CVE-2023-25728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25728">CVE-2023-25728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25729/">CVE-2023-25729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25729">CVE-2023-25729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25730/">CVE-2023-25730 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25730">CVE-2023-25730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25732/">CVE-2023-25732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25732">CVE-2023-25732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25735/">CVE-2023-25735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25735">CVE-2023-25735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25737/">CVE-2023-25737 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25737">CVE-2023-25737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25739/">CVE-2023-25739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25739">CVE-2023-25739 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25742/">CVE-2023-25742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25742">CVE-2023-25742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25743/">CVE-2023-25743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25743">CVE-2023-25743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25744/">CVE-2023-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25744">CVE-2023-25744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25746/">CVE-2023-25746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25746">CVE-2023-25746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830074" comment="thunderbird-102.8.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1275" version="1" class="patch">
	<metadata>
		<title>security update for git (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-23521" ref_url="https://www.suse.com/security/cve/CVE-2022-23521/" source="CVE"/>
		<reference ref_id="CVE-2022-41903" ref_url="https://www.suse.com/security/cve/CVE-2022-41903/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:0978.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:0978.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23521/">CVE-2022-23521 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23521">CVE-2022-23521 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41903/">CVE-2022-41903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41903">CVE-2022-41903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830075" comment="emacs-git-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830076" comment="emacs-git-el-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830077" comment="git-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830078" comment="git-all-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830079" comment="git-bzr-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830080" comment="git-cvs-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830081" comment="git-daemon-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830082" comment="git-email-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830083" comment="git-gnome-keyring-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830084" comment="git-gui-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830085" comment="git-hg-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830086" comment="git-instaweb-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830087" comment="git-p4-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830088" comment="git-svn-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830089" comment="gitk-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830090" comment="gitweb-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830091" comment="perl-Git-1.8.3.1-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830092" comment="perl-Git-SVN-1.8.3.1-24.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1276" version="1" class="patch">
	<metadata>
		<title>security update for samba (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-38023" ref_url="https://www.suse.com/security/cve/CVE-2022-38023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1090.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1090.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38023/">CVE-2022-38023 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38023">CVE-2022-38023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830093" comment="ctdb-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830094" comment="ctdb-tests-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830095" comment="libsmbclient-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830096" comment="libsmbclient-devel-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830097" comment="libwbclient-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830098" comment="libwbclient-devel-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830099" comment="samba-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830100" comment="samba-client-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830101" comment="samba-client-libs-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830102" comment="samba-common-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830103" comment="samba-common-libs-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830104" comment="samba-common-tools-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830105" comment="samba-dc-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830106" comment="samba-dc-libs-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830107" comment="samba-devel-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830108" comment="samba-krb5-printing-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830109" comment="samba-libs-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830110" comment="samba-pidl-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830111" comment="samba-python-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830112" comment="samba-python-test-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830113" comment="samba-test-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830114" comment="samba-test-libs-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830115" comment="samba-vfs-glusterfs-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830116" comment="samba-winbind-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830117" comment="samba-winbind-clients-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830118" comment="samba-winbind-krb5-locator-4.10.16-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830119" comment="samba-winbind-modules-4.10.16-24.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1277" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-42703" ref_url="https://www.suse.com/security/cve/CVE-2022-42703/" source="CVE"/>
		<reference ref_id="CVE-2022-4378" ref_url="https://www.suse.com/security/cve/CVE-2022-4378/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1091.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1091.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42703/">CVE-2022-42703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42703">CVE-2022-42703 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4378/">CVE-2022-4378 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4378">CVE-2022-4378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830120" comment="bpftool-3.10.0-1160.88.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830121" comment="kernel-3.10.0-1160.88.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830122" comment="kernel-abi-whitelists-3.10.0-1160.88.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830123" comment="kernel-debug-3.10.0-1160.88.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830126" comment="kernel-doc-3.10.0-1160.88.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830127" comment="kernel-headers-3.10.0-1160.88.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830128" comment="kernel-tools-3.10.0-1160.88.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830129" comment="kernel-tools-libs-3.10.0-1160.88.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830131" comment="perf-3.10.0-1160.88.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830132" comment="python-perf-3.10.0-1160.88.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1278" version="1" class="patch">
	<metadata>
		<title>security update for pesign (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-3560" ref_url="https://www.suse.com/security/cve/CVE-2022-3560/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1093.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1093.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3560/">CVE-2022-3560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3560">CVE-2022-3560 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830133" comment="pesign-0.109-11.el7_9 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830133" comment="pesign-0.109-11.el7_9 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1279" version="1" class="patch">
	<metadata>
		<title>security update for zlib (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1095.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1095.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830134" comment="minizip-1.2.7-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830135" comment="minizip-devel-1.2.7-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830136" comment="zlib-1.2.7-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830137" comment="zlib-devel-1.2.7-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830138" comment="zlib-static-1.2.7-21.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830134" comment="minizip-1.2.7-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830135" comment="minizip-devel-1.2.7-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830136" comment="zlib-1.2.7-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830137" comment="zlib-devel-1.2.7-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830138" comment="zlib-static-1.2.7-21.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1280" version="1" class="patch">
	<metadata>
		<title>security update for nss (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1332.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1332.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830139" comment="nss-3.79.0-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830140" comment="nss-devel-3.79.0-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830141" comment="nss-pkcs11-devel-3.79.0-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830142" comment="nss-sysinit-3.79.0-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830143" comment="nss-tools-3.79.0-5.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1281" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-25751" ref_url="https://www.suse.com/security/cve/CVE-2023-25751/" source="CVE"/>
		<reference ref_id="CVE-2023-25752" ref_url="https://www.suse.com/security/cve/CVE-2023-25752/" source="CVE"/>
		<reference ref_id="CVE-2023-28162" ref_url="https://www.suse.com/security/cve/CVE-2023-28162/" source="CVE"/>
		<reference ref_id="CVE-2023-28164" ref_url="https://www.suse.com/security/cve/CVE-2023-28164/" source="CVE"/>
		<reference ref_id="CVE-2023-28176" ref_url="https://www.suse.com/security/cve/CVE-2023-28176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1333.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1333.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25751/">CVE-2023-25751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25751">CVE-2023-25751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25752/">CVE-2023-25752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25752">CVE-2023-25752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28162/">CVE-2023-28162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28162">CVE-2023-28162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28164/">CVE-2023-28164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28164">CVE-2023-28164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28176/">CVE-2023-28176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28176">CVE-2023-28176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830144" comment="firefox-102.9.0-3.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1282" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1335.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1335.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830145" comment="openssl-1.0.2k-26.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830146" comment="openssl-devel-1.0.2k-26.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830147" comment="openssl-libs-1.0.2k-26.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830148" comment="openssl-perl-1.0.2k-26.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830149" comment="openssl-static-1.0.2k-26.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830145" comment="openssl-1.0.2k-26.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830146" comment="openssl-devel-1.0.2k-26.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830147" comment="openssl-libs-1.0.2k-26.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830148" comment="openssl-perl-1.0.2k-26.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830149" comment="openssl-static-1.0.2k-26.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1283" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-25751" ref_url="https://www.suse.com/security/cve/CVE-2023-25751/" source="CVE"/>
		<reference ref_id="CVE-2023-25752" ref_url="https://www.suse.com/security/cve/CVE-2023-25752/" source="CVE"/>
		<reference ref_id="CVE-2023-28162" ref_url="https://www.suse.com/security/cve/CVE-2023-28162/" source="CVE"/>
		<reference ref_id="CVE-2023-28164" ref_url="https://www.suse.com/security/cve/CVE-2023-28164/" source="CVE"/>
		<reference ref_id="CVE-2023-28176" ref_url="https://www.suse.com/security/cve/CVE-2023-28176/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1401.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1401.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25751/">CVE-2023-25751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25751">CVE-2023-25751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25752/">CVE-2023-25752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25752">CVE-2023-25752 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28162/">CVE-2023-28162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28162">CVE-2023-28162 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28164/">CVE-2023-28164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28164">CVE-2023-28164 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28176/">CVE-2023-28176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28176">CVE-2023-28176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830150" comment="thunderbird-102.9.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1284" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-25690" ref_url="https://www.suse.com/security/cve/CVE-2023-25690/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1593.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1593.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-25690/">CVE-2023-25690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25690">CVE-2023-25690 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830151" comment="httpd-2.4.6-98.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830152" comment="httpd-devel-2.4.6-98.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830153" comment="httpd-manual-2.4.6-98.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830154" comment="httpd-tools-2.4.6-98.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830155" comment="mod_ldap-2.4.6-98.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830156" comment="mod_proxy_html-2.4.6-98.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830157" comment="mod_session-2.4.6-98.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830158" comment="mod_ssl-2.4.6-98.el7_9.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1285" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-1393" ref_url="https://www.suse.com/security/cve/CVE-2023-1393/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1594.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1594.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1393/">CVE-2023-1393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1393">CVE-2023-1393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830159" comment="tigervnc-1.8.0-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830160" comment="tigervnc-icons-1.8.0-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830161" comment="tigervnc-license-1.8.0-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830162" comment="tigervnc-server-1.8.0-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830163" comment="tigervnc-server-applet-1.8.0-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830164" comment="tigervnc-server-minimal-1.8.0-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830165" comment="tigervnc-server-module-1.8.0-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830166" comment="xorg-x11-server-Xdmx-1.20.4-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830167" comment="xorg-x11-server-Xephyr-1.20.4-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830168" comment="xorg-x11-server-Xnest-1.20.4-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830169" comment="xorg-x11-server-Xorg-1.20.4-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830170" comment="xorg-x11-server-Xvfb-1.20.4-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830171" comment="xorg-x11-server-Xwayland-1.20.4-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830172" comment="xorg-x11-server-common-1.20.4-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830173" comment="xorg-x11-server-devel-1.20.4-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830174" comment="xorg-x11-server-source-1.20.4-23.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1286" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-1945" ref_url="https://www.suse.com/security/cve/CVE-2023-1945/" source="CVE"/>
		<reference ref_id="CVE-2023-29533" ref_url="https://www.suse.com/security/cve/CVE-2023-29533/" source="CVE"/>
		<reference ref_id="CVE-2023-29535" ref_url="https://www.suse.com/security/cve/CVE-2023-29535/" source="CVE"/>
		<reference ref_id="CVE-2023-29536" ref_url="https://www.suse.com/security/cve/CVE-2023-29536/" source="CVE"/>
		<reference ref_id="CVE-2023-29539" ref_url="https://www.suse.com/security/cve/CVE-2023-29539/" source="CVE"/>
		<reference ref_id="CVE-2023-29541" ref_url="https://www.suse.com/security/cve/CVE-2023-29541/" source="CVE"/>
		<reference ref_id="CVE-2023-29548" ref_url="https://www.suse.com/security/cve/CVE-2023-29548/" source="CVE"/>
		<reference ref_id="CVE-2023-29550" ref_url="https://www.suse.com/security/cve/CVE-2023-29550/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1791.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1791.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-1945/">CVE-2023-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1945">CVE-2023-1945 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29533/">CVE-2023-29533 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29533">CVE-2023-29533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29535/">CVE-2023-29535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29535">CVE-2023-29535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29536/">CVE-2023-29536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29536">CVE-2023-29536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29539/">CVE-2023-29539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29539">CVE-2023-29539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29541/">CVE-2023-29541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29541">CVE-2023-29541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29548/">CVE-2023-29548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29548">CVE-2023-29548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29550/">CVE-2023-29550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29550">CVE-2023-29550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830175" comment="firefox-102.10.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1287" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-0547" ref_url="https://www.suse.com/security/cve/CVE-2023-0547/" source="CVE"/>
		<reference ref_id="CVE-2023-1945" ref_url="https://www.suse.com/security/cve/CVE-2023-1945/" source="CVE"/>
		<reference ref_id="CVE-2023-28427" ref_url="https://www.suse.com/security/cve/CVE-2023-28427/" source="CVE"/>
		<reference ref_id="CVE-2023-29479" ref_url="https://www.suse.com/security/cve/CVE-2023-29479/" source="CVE"/>
		<reference ref_id="CVE-2023-29533" ref_url="https://www.suse.com/security/cve/CVE-2023-29533/" source="CVE"/>
		<reference ref_id="CVE-2023-29535" ref_url="https://www.suse.com/security/cve/CVE-2023-29535/" source="CVE"/>
		<reference ref_id="CVE-2023-29536" ref_url="https://www.suse.com/security/cve/CVE-2023-29536/" source="CVE"/>
		<reference ref_id="CVE-2023-29539" ref_url="https://www.suse.com/security/cve/CVE-2023-29539/" source="CVE"/>
		<reference ref_id="CVE-2023-29541" ref_url="https://www.suse.com/security/cve/CVE-2023-29541/" source="CVE"/>
		<reference ref_id="CVE-2023-29548" ref_url="https://www.suse.com/security/cve/CVE-2023-29548/" source="CVE"/>
		<reference ref_id="CVE-2023-29550" ref_url="https://www.suse.com/security/cve/CVE-2023-29550/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1806.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1806.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0547/">CVE-2023-0547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0547">CVE-2023-0547 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-1945/">CVE-2023-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1945">CVE-2023-1945 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-28427/">CVE-2023-28427 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28427">CVE-2023-28427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29479/">CVE-2023-29479 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29479">CVE-2023-29479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29533/">CVE-2023-29533 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29533">CVE-2023-29533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29535/">CVE-2023-29535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29535">CVE-2023-29535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29536/">CVE-2023-29536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29536">CVE-2023-29536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29539/">CVE-2023-29539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29539">CVE-2023-29539 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29541/">CVE-2023-29541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29541">CVE-2023-29541 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29548/">CVE-2023-29548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29548">CVE-2023-29548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29550/">CVE-2023-29550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29550">CVE-2023-29550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830176" comment="thunderbird-102.10.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1288" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1875.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1875.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830177" comment="java-11-openjdk-11.0.19.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830178" comment="java-11-openjdk-demo-11.0.19.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830179" comment="java-11-openjdk-devel-11.0.19.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830180" comment="java-11-openjdk-headless-11.0.19.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830181" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830182" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830183" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830184" comment="java-11-openjdk-src-11.0.19.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830185" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1289" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1904.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1904.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830186" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830187" comment="java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830188" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830189" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830190" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830191" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830193" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1290" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-43750" ref_url="https://www.suse.com/security/cve/CVE-2022-43750/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:1987.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:1987.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43750/">CVE-2022-43750 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750">CVE-2022-43750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830194" comment="bpftool-3.10.0-1160.90.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830195" comment="kernel-3.10.0-1160.90.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830196" comment="kernel-abi-whitelists-3.10.0-1160.90.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830197" comment="kernel-debug-3.10.0-1160.90.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830200" comment="kernel-doc-3.10.0-1160.90.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830201" comment="kernel-headers-3.10.0-1160.90.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830202" comment="kernel-tools-3.10.0-1160.90.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830203" comment="kernel-tools-libs-3.10.0-1160.90.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830205" comment="perf-3.10.0-1160.90.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830206" comment="python-perf-3.10.0-1160.90.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1291" version="1" class="patch">
	<metadata>
		<title>security update for libwebp (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:2077.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:2077.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830207" comment="libwebp-0.3.0-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830208" comment="libwebp-devel-0.3.0-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830209" comment="libwebp-java-0.3.0-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830210" comment="libwebp-tools-0.3.0-11.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830207" comment="libwebp-0.3.0-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830208" comment="libwebp-devel-0.3.0-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830209" comment="libwebp-java-0.3.0-11.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830210" comment="libwebp-tools-0.3.0-11.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1292" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-32205" ref_url="https://www.suse.com/security/cve/CVE-2023-32205/" source="CVE"/>
		<reference ref_id="CVE-2023-32206" ref_url="https://www.suse.com/security/cve/CVE-2023-32206/" source="CVE"/>
		<reference ref_id="CVE-2023-32207" ref_url="https://www.suse.com/security/cve/CVE-2023-32207/" source="CVE"/>
		<reference ref_id="CVE-2023-32211" ref_url="https://www.suse.com/security/cve/CVE-2023-32211/" source="CVE"/>
		<reference ref_id="CVE-2023-32212" ref_url="https://www.suse.com/security/cve/CVE-2023-32212/" source="CVE"/>
		<reference ref_id="CVE-2023-32213" ref_url="https://www.suse.com/security/cve/CVE-2023-32213/" source="CVE"/>
		<reference ref_id="CVE-2023-32215" ref_url="https://www.suse.com/security/cve/CVE-2023-32215/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3137.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3137.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32205/">CVE-2023-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32205">CVE-2023-32205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32206/">CVE-2023-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32206">CVE-2023-32206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32207/">CVE-2023-32207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32207">CVE-2023-32207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32211/">CVE-2023-32211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32211">CVE-2023-32211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32212/">CVE-2023-32212 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32212">CVE-2023-32212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32213/">CVE-2023-32213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32213">CVE-2023-32213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32215/">CVE-2023-32215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32215">CVE-2023-32215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830211" comment="firefox-102.11.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1293" version="1" class="patch">
	<metadata>
		<title>security update for apr-util (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-25147" ref_url="https://www.suse.com/security/cve/CVE-2022-25147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3145.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3145.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25147/">CVE-2022-25147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25147">CVE-2022-25147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830212" comment="apr-util-1.5.2-6.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830213" comment="apr-util-devel-1.5.2-6.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830214" comment="apr-util-ldap-1.5.2-6.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830215" comment="apr-util-mysql-1.5.2-6.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830216" comment="apr-util-nss-1.5.2-6.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830217" comment="apr-util-odbc-1.5.2-6.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830218" comment="apr-util-openssl-1.5.2-6.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830219" comment="apr-util-pgsql-1.5.2-6.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830220" comment="apr-util-sqlite-1.5.2-6.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1294" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-32205" ref_url="https://www.suse.com/security/cve/CVE-2023-32205/" source="CVE"/>
		<reference ref_id="CVE-2023-32206" ref_url="https://www.suse.com/security/cve/CVE-2023-32206/" source="CVE"/>
		<reference ref_id="CVE-2023-32207" ref_url="https://www.suse.com/security/cve/CVE-2023-32207/" source="CVE"/>
		<reference ref_id="CVE-2023-32211" ref_url="https://www.suse.com/security/cve/CVE-2023-32211/" source="CVE"/>
		<reference ref_id="CVE-2023-32212" ref_url="https://www.suse.com/security/cve/CVE-2023-32212/" source="CVE"/>
		<reference ref_id="CVE-2023-32213" ref_url="https://www.suse.com/security/cve/CVE-2023-32213/" source="CVE"/>
		<reference ref_id="CVE-2023-32215" ref_url="https://www.suse.com/security/cve/CVE-2023-32215/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3151.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3151.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32205/">CVE-2023-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32205">CVE-2023-32205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32206/">CVE-2023-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32206">CVE-2023-32206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32207/">CVE-2023-32207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32207">CVE-2023-32207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32211/">CVE-2023-32211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32211">CVE-2023-32211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32212/">CVE-2023-32212 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32212">CVE-2023-32212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32213/">CVE-2023-32213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32213">CVE-2023-32213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32215/">CVE-2023-32215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32215">CVE-2023-32215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830221" comment="thunderbird-102.11.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1295" version="1" class="patch">
	<metadata>
		<title>security update for git (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-25652" ref_url="https://www.suse.com/security/cve/CVE-2023-25652/" source="CVE"/>
		<reference ref_id="CVE-2023-29007" ref_url="https://www.suse.com/security/cve/CVE-2023-29007/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3263.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3263.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25652/">CVE-2023-25652 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25652">CVE-2023-25652 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-29007/">CVE-2023-29007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29007">CVE-2023-29007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830222" comment="emacs-git-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830223" comment="emacs-git-el-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830224" comment="git-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830225" comment="git-all-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830226" comment="git-bzr-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830227" comment="git-cvs-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830228" comment="git-daemon-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830229" comment="git-email-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830230" comment="git-gnome-keyring-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830231" comment="git-gui-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830232" comment="git-hg-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830233" comment="git-instaweb-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830234" comment="git-p4-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830235" comment="git-svn-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830236" comment="gitk-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830237" comment="gitweb-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830238" comment="perl-Git-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830239" comment="perl-Git-SVN-1.8.3.1-25.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830222" comment="emacs-git-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830223" comment="emacs-git-el-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830224" comment="git-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830225" comment="git-all-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830226" comment="git-bzr-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830227" comment="git-cvs-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830228" comment="git-daemon-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830229" comment="git-email-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830230" comment="git-gnome-keyring-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830231" comment="git-gui-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830232" comment="git-hg-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830233" comment="git-instaweb-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830234" comment="git-p4-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830235" comment="git-svn-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830236" comment="gitk-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830237" comment="gitweb-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830238" comment="perl-Git-1.8.3.1-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830239" comment="perl-Git-SVN-1.8.3.1-25.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1296" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-48339" ref_url="https://www.suse.com/security/cve/CVE-2022-48339/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3481.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3481.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48339/">CVE-2022-48339 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48339">CVE-2022-48339 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830240" comment="emacs-24.3-23.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830241" comment="emacs-common-24.3-23.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830242" comment="emacs-el-24.3-23.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830243" comment="emacs-filesystem-24.3-23.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830244" comment="emacs-nox-24.3-23.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830245" comment="emacs-terminal-24.3-23.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830240" comment="emacs-24.3-23.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830241" comment="emacs-common-24.3-23.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830242" comment="emacs-el-24.3-23.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830243" comment="emacs-filesystem-24.3-23.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830244" comment="emacs-nox-24.3-23.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830245" comment="emacs-terminal-24.3-23.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1297" version="1" class="patch">
	<metadata>
		<title>security update for python (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3555.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3555.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830246" comment="python-2.7.5-93.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830247" comment="python-debug-2.7.5-93.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830248" comment="python-devel-2.7.5-93.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830249" comment="python-libs-2.7.5-93.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830250" comment="python-test-2.7.5-93.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830251" comment="python-tools-2.7.5-93.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830252" comment="tkinter-2.7.5-93.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1298" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3556.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3556.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830253" comment="python3-3.6.8-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830254" comment="python3-debug-3.6.8-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830255" comment="python3-devel-3.6.8-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830256" comment="python3-idle-3.6.8-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830257" comment="python3-libs-3.6.8-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830258" comment="python3-test-3.6.8-19.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830259" comment="python3-tkinter-3.6.8-19.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1299" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414/" source="CVE"/>
		<reference ref_id="CVE-2023-34416" ref_url="https://www.suse.com/security/cve/CVE-2023-34416/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3563.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3563.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34416/">CVE-2023-34416 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34416">CVE-2023-34416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830260" comment="thunderbird-102.12.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1300" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414/" source="CVE"/>
		<reference ref_id="CVE-2023-34416" ref_url="https://www.suse.com/security/cve/CVE-2023-34416/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3579.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3579.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34416/">CVE-2023-34416 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34416">CVE-2023-34416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830261" comment="firefox-102.12.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1301" version="1" class="patch">
	<metadata>
		<title>security update for c-ares (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3741.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3741.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830262" comment="c-ares-1.10.0-3.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830263" comment="c-ares-devel-1.10.0-3.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830262" comment="c-ares-1.10.0-3.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830263" comment="c-ares-devel-1.10.0-3.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1302" version="1" class="patch">
	<metadata>
		<title>security update for open-vm-tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-20867" ref_url="https://www.suse.com/security/cve/CVE-2023-20867/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:3944.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:3944.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-20867/">CVE-2023-20867 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20867">CVE-2023-20867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830264" comment="open-vm-tools-11.0.5-3.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830265" comment="open-vm-tools-desktop-11.0.5-3.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830266" comment="open-vm-tools-devel-11.0.5-3.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830267" comment="open-vm-tools-test-11.0.5-3.el7_9.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1303" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-37201" ref_url="https://www.suse.com/security/cve/CVE-2023-37201/" source="CVE"/>
		<reference ref_id="CVE-2023-37202" ref_url="https://www.suse.com/security/cve/CVE-2023-37202/" source="CVE"/>
		<reference ref_id="CVE-2023-37207" ref_url="https://www.suse.com/security/cve/CVE-2023-37207/" source="CVE"/>
		<reference ref_id="CVE-2023-37208" ref_url="https://www.suse.com/security/cve/CVE-2023-37208/" source="CVE"/>
		<reference ref_id="CVE-2023-37211" ref_url="https://www.suse.com/security/cve/CVE-2023-37211/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4062.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4062.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37201/">CVE-2023-37201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37201">CVE-2023-37201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37202/">CVE-2023-37202 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37202">CVE-2023-37202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37207/">CVE-2023-37207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37207">CVE-2023-37207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37208/">CVE-2023-37208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37208">CVE-2023-37208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37211/">CVE-2023-37211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37211">CVE-2023-37211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830268" comment="thunderbird-102.13.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1304" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-37201" ref_url="https://www.suse.com/security/cve/CVE-2023-37201/" source="CVE"/>
		<reference ref_id="CVE-2023-37202" ref_url="https://www.suse.com/security/cve/CVE-2023-37202/" source="CVE"/>
		<reference ref_id="CVE-2023-37207" ref_url="https://www.suse.com/security/cve/CVE-2023-37207/" source="CVE"/>
		<reference ref_id="CVE-2023-37208" ref_url="https://www.suse.com/security/cve/CVE-2023-37208/" source="CVE"/>
		<reference ref_id="CVE-2023-37211" ref_url="https://www.suse.com/security/cve/CVE-2023-37211/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4079.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4079.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37201/">CVE-2023-37201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37201">CVE-2023-37201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37202/">CVE-2023-37202 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37202">CVE-2023-37202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37207/">CVE-2023-37207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37207">CVE-2023-37207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37208/">CVE-2023-37208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37208">CVE-2023-37208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37211/">CVE-2023-37211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37211">CVE-2023-37211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830269" comment="firefox-102.13.0-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1305" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-3564" ref_url="https://www.suse.com/security/cve/CVE-2022-3564/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4151.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4151.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3564/">CVE-2022-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564">CVE-2022-3564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830270" comment="bpftool-3.10.0-1160.95.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830271" comment="kernel-3.10.0-1160.95.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830272" comment="kernel-abi-whitelists-3.10.0-1160.95.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830273" comment="kernel-debug-3.10.0-1160.95.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830276" comment="kernel-doc-3.10.0-1160.95.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830277" comment="kernel-headers-3.10.0-1160.95.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830278" comment="kernel-tools-3.10.0-1160.95.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830279" comment="kernel-tools-libs-3.10.0-1160.95.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830281" comment="perf-3.10.0-1160.95.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830282" comment="python-perf-3.10.0-1160.95.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1306" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-2828" ref_url="https://www.suse.com/security/cve/CVE-2023-2828/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4152.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4152.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2828/">CVE-2023-2828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2828">CVE-2023-2828 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830283" comment="bind-9.11.4-26.P2.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830284" comment="bind-chroot-9.11.4-26.P2.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830285" comment="bind-devel-9.11.4-26.P2.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830286" comment="bind-export-devel-9.11.4-26.P2.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830287" comment="bind-export-libs-9.11.4-26.P2.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830288" comment="bind-libs-9.11.4-26.P2.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830289" comment="bind-libs-lite-9.11.4-26.P2.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830290" comment="bind-license-9.11.4-26.P2.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830291" comment="bind-lite-devel-9.11.4-26.P2.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830292" comment="bind-pkcs11-9.11.4-26.P2.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830293" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830294" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830295" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830296" comment="bind-sdb-9.11.4-26.P2.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830297" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830298" comment="bind-utils-9.11.4-26.P2.el7_9.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1307" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4166.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4166.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830299" comment="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830300" comment="java-1.8.0-openjdk-accessibility-1.8.0.382.b05-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830301" comment="java-1.8.0-openjdk-demo-1.8.0.382.b05-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830302" comment="java-1.8.0-openjdk-devel-1.8.0.382.b05-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830303" comment="java-1.8.0-openjdk-headless-1.8.0.382.b05-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830304" comment="java-1.8.0-openjdk-javadoc-1.8.0.382.b05-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830305" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830306" comment="java-1.8.0-openjdk-src-1.8.0.382.b05-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1308" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006/" source="CVE"/>
		<reference ref_id="CVE-2023-22036" ref_url="https://www.suse.com/security/cve/CVE-2023-22036/" source="CVE"/>
		<reference ref_id="CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041/" source="CVE"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4233.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4233.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22036/">CVE-2023-22036 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22036">CVE-2023-22036 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830307" comment="java-11-openjdk-11.0.20.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830308" comment="java-11-openjdk-demo-11.0.20.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830309" comment="java-11-openjdk-devel-11.0.20.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830310" comment="java-11-openjdk-headless-11.0.20.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830311" comment="java-11-openjdk-javadoc-11.0.20.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830312" comment="java-11-openjdk-javadoc-zip-11.0.20.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830313" comment="java-11-openjdk-jmods-11.0.20.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830314" comment="java-11-openjdk-src-11.0.20.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830315" comment="java-11-openjdk-static-libs-11.0.20.0.8-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1309" version="1" class="patch">
	<metadata>
		<title>security update for iperf3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-38403" ref_url="https://www.suse.com/security/cve/CVE-2023-38403/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4326.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4326.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38403/">CVE-2023-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38403">CVE-2023-38403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830316" comment="iperf3-3.1.7-3.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830317" comment="iperf3-devel-3.1.7-3.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830316" comment="iperf3-3.1.7-3.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830317" comment="iperf3-devel-3.1.7-3.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1310" version="1" class="patch">
	<metadata>
		<title>security update for openssh (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-38408" ref_url="https://www.suse.com/security/cve/CVE-2023-38408/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4382.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4382.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38408/">CVE-2023-38408 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408">CVE-2023-38408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830318" comment="openssh-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830319" comment="openssh-askpass-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830320" comment="openssh-cavs-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830321" comment="openssh-clients-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830322" comment="openssh-keycat-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830323" comment="openssh-ldap-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830324" comment="openssh-server-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830325" comment="openssh-server-sysvinit-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830326" comment="pam_ssh_agent_auth-0.10.3-2.23.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830318" comment="openssh-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830319" comment="openssh-askpass-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830320" comment="openssh-cavs-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830321" comment="openssh-clients-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830322" comment="openssh-keycat-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830323" comment="openssh-ldap-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830324" comment="openssh-server-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830325" comment="openssh-server-sysvinit-7.4p1-23.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830326" comment="pam_ssh_agent_auth-0.10.3-2.23.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1311" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045/" source="CVE"/>
		<reference ref_id="CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046/" source="CVE"/>
		<reference ref_id="CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047/" source="CVE"/>
		<reference ref_id="CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048/" source="CVE"/>
		<reference ref_id="CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049/" source="CVE"/>
		<reference ref_id="CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050/" source="CVE"/>
		<reference ref_id="CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055/" source="CVE"/>
		<reference ref_id="CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056/" source="CVE"/>
		<reference ref_id="CVE-2023-4057" ref_url="https://www.suse.com/security/cve/CVE-2023-4057/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4461.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4461.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4057/">CVE-2023-4057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4057">CVE-2023-4057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830327" comment="firefox-102.14.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1312" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-3417" ref_url="https://www.suse.com/security/cve/CVE-2023-3417/" source="CVE"/>
		<reference ref_id="CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045/" source="CVE"/>
		<reference ref_id="CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046/" source="CVE"/>
		<reference ref_id="CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047/" source="CVE"/>
		<reference ref_id="CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048/" source="CVE"/>
		<reference ref_id="CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049/" source="CVE"/>
		<reference ref_id="CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050/" source="CVE"/>
		<reference ref_id="CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055/" source="CVE"/>
		<reference ref_id="CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056/" source="CVE"/>
		<reference ref_id="CVE-2023-4057" ref_url="https://www.suse.com/security/cve/CVE-2023-4057/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4495.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4495.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3417/">CVE-2023-3417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3417">CVE-2023-3417 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4057/">CVE-2023-4057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4057">CVE-2023-4057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830328" comment="thunderbird-102.14.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1313" version="1" class="patch">
	<metadata>
		<title>security update for cups (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-32360" ref_url="https://www.suse.com/security/cve/CVE-2023-32360/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4766.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4766.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32360/">CVE-2023-32360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32360">CVE-2023-32360 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830329" comment="cups-1.6.3-52.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830330" comment="cups-client-1.6.3-52.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830331" comment="cups-devel-1.6.3-52.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830332" comment="cups-filesystem-1.6.3-52.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830333" comment="cups-ipptool-1.6.3-52.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830334" comment="cups-libs-1.6.3-52.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830335" comment="cups-lpd-1.6.3-52.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830329" comment="cups-1.6.3-52.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830330" comment="cups-client-1.6.3-52.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830331" comment="cups-devel-1.6.3-52.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830332" comment="cups-filesystem-1.6.3-52.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830333" comment="cups-ipptool-1.6.3-52.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830334" comment="cups-libs-1.6.3-52.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830335" comment="cups-lpd-1.6.3-52.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1314" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="CVE-2023-35788" ref_url="https://www.suse.com/security/cve/CVE-2023-35788/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4819.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4819.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35788/">CVE-2023-35788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830336" comment="bpftool-3.10.0-1160.99.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830337" comment="kernel-3.10.0-1160.99.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830338" comment="kernel-abi-whitelists-3.10.0-1160.99.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830339" comment="kernel-debug-3.10.0-1160.99.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830342" comment="kernel-doc-3.10.0-1160.99.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830343" comment="kernel-headers-3.10.0-1160.99.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830344" comment="kernel-tools-3.10.0-1160.99.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830345" comment="kernel-tools-libs-3.10.0-1160.99.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830347" comment="perf-3.10.0-1160.99.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830348" comment="python-perf-3.10.0-1160.99.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1315" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051/" source="CVE"/>
		<reference ref_id="CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053/" source="CVE"/>
		<reference ref_id="CVE-2023-4573" ref_url="https://www.suse.com/security/cve/CVE-2023-4573/" source="CVE"/>
		<reference ref_id="CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574/" source="CVE"/>
		<reference ref_id="CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575/" source="CVE"/>
		<reference ref_id="CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577/" source="CVE"/>
		<reference ref_id="CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578/" source="CVE"/>
		<reference ref_id="CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580/" source="CVE"/>
		<reference ref_id="CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581/" source="CVE"/>
		<reference ref_id="CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583/" source="CVE"/>
		<reference ref_id="CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584/" source="CVE"/>
		<reference ref_id="CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:4945.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:4945.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4573/">CVE-2023-4573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4573">CVE-2023-4573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830349" comment="thunderbird-102.15.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1316" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051/" source="CVE"/>
		<reference ref_id="CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053/" source="CVE"/>
		<reference ref_id="CVE-2023-4573" ref_url="https://www.suse.com/security/cve/CVE-2023-4573/" source="CVE"/>
		<reference ref_id="CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574/" source="CVE"/>
		<reference ref_id="CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575/" source="CVE"/>
		<reference ref_id="CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577/" source="CVE"/>
		<reference ref_id="CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578/" source="CVE"/>
		<reference ref_id="CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580/" source="CVE"/>
		<reference ref_id="CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581/" source="CVE"/>
		<reference ref_id="CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583/" source="CVE"/>
		<reference ref_id="CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584/" source="CVE"/>
		<reference ref_id="CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5019.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5019.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4573/">CVE-2023-4573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4573">CVE-2023-4573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830350" comment="firefox-102.15.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1317" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5191.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5191.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830351" comment="thunderbird-102.15.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1318" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5197.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5197.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830352" comment="firefox-102.15.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1319" version="1" class="patch">
	<metadata>
		<title>security update for open-vm-tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-20900" ref_url="https://www.suse.com/security/cve/CVE-2023-20900/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5217.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5217.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20900/">CVE-2023-20900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830353" comment="open-vm-tools-11.0.5-3.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830354" comment="open-vm-tools-desktop-11.0.5-3.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830355" comment="open-vm-tools-devel-11.0.5-3.el7_9.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830356" comment="open-vm-tools-test-11.0.5-3.el7_9.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1320" version="1" class="patch">
	<metadata>
		<title>security update for ImageMagick (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-40211" ref_url="https://www.suse.com/security/cve/CVE-2021-40211/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5461.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5461.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-40211/">CVE-2021-40211 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40211">CVE-2021-40211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830357" comment="ImageMagick-6.9.10.68-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830358" comment="ImageMagick-c++-6.9.10.68-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830359" comment="ImageMagick-c++-devel-6.9.10.68-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830360" comment="ImageMagick-devel-6.9.10.68-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830361" comment="ImageMagick-doc-6.9.10.68-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830362" comment="ImageMagick-perl-6.9.10.68-7.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830357" comment="ImageMagick-6.9.10.68-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830358" comment="ImageMagick-c++-6.9.10.68-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830359" comment="ImageMagick-c++-devel-6.9.10.68-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830360" comment="ImageMagick-devel-6.9.10.68-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830361" comment="ImageMagick-doc-6.9.10.68-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830362" comment="ImageMagick-perl-6.9.10.68-7.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1321" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-3600" ref_url="https://www.suse.com/security/cve/CVE-2023-3600/" source="CVE"/>
		<reference ref_id="CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169/" source="CVE"/>
		<reference ref_id="CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171/" source="CVE"/>
		<reference ref_id="CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5475.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5475.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3600/">CVE-2023-3600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3600">CVE-2023-3600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830363" comment="thunderbird-115.3.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1322" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-3600" ref_url="https://www.suse.com/security/cve/CVE-2023-3600/" source="CVE"/>
		<reference ref_id="CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169/" source="CVE"/>
		<reference ref_id="CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171/" source="CVE"/>
		<reference ref_id="CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5477.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5477.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3600/">CVE-2023-3600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3600">CVE-2023-3600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830364" comment="firefox-115.3.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1323" version="1" class="patch">
	<metadata>
		<title>security update for libssh2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-22218" ref_url="https://www.suse.com/security/cve/CVE-2020-22218/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5615.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5615.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22218/">CVE-2020-22218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22218">CVE-2020-22218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830365" comment="libssh2-1.8.0-4.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830366" comment="libssh2-devel-1.8.0-4.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830367" comment="libssh2-docs-1.8.0-4.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830365" comment="libssh2-1.8.0-4.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830366" comment="libssh2-devel-1.8.0-4.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830367" comment="libssh2-docs-1.8.0-4.el7_9.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1324" version="1" class="patch">
	<metadata>
		<title>security update for python-reportlab (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2019-19450" ref_url="https://www.suse.com/security/cve/CVE-2019-19450/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5616.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5616.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-19450/">CVE-2019-19450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19450">CVE-2019-19450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830368" comment="python-reportlab-2.5-11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830369" comment="python-reportlab-docs-2.5-11.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830368" comment="python-reportlab-2.5-11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830369" comment="python-reportlab-docs-2.5-11.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1325" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-32233" ref_url="https://www.suse.com/security/cve/CVE-2023-32233/" source="CVE"/>
		<reference ref_id="CVE-2023-35001" ref_url="https://www.suse.com/security/cve/CVE-2023-35001/" source="CVE"/>
		<reference ref_id="CVE-2023-3609" ref_url="https://www.suse.com/security/cve/CVE-2023-3609/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5622.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5622.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32233/">CVE-2023-32233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35001/">CVE-2023-35001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3609/">CVE-2023-3609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830370" comment="bpftool-3.10.0-1160.102.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830371" comment="kernel-3.10.0-1160.102.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830372" comment="kernel-abi-whitelists-3.10.0-1160.102.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830373" comment="kernel-debug-3.10.0-1160.102.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830376" comment="kernel-doc-3.10.0-1160.102.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830377" comment="kernel-headers-3.10.0-1160.102.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830378" comment="kernel-tools-3.10.0-1160.102.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830379" comment="kernel-tools-libs-3.10.0-1160.102.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830381" comment="perf-3.10.0-1160.102.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830382" comment="python-perf-3.10.0-1160.102.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1326" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-3341" ref_url="https://www.suse.com/security/cve/CVE-2023-3341/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5691.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5691.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3341/">CVE-2023-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3341">CVE-2023-3341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830383" comment="bind-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830384" comment="bind-chroot-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830385" comment="bind-devel-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830386" comment="bind-export-devel-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830387" comment="bind-export-libs-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830388" comment="bind-libs-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830389" comment="bind-libs-lite-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830390" comment="bind-license-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830391" comment="bind-lite-devel-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830392" comment="bind-pkcs11-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830393" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830394" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830395" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830396" comment="bind-sdb-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830397" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830398" comment="bind-utils-9.11.4-26.P2.el7_9.15 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830383" comment="bind-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830384" comment="bind-chroot-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830385" comment="bind-devel-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830386" comment="bind-export-devel-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830387" comment="bind-export-libs-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830388" comment="bind-libs-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830389" comment="bind-libs-lite-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830390" comment="bind-license-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830391" comment="bind-lite-devel-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830392" comment="bind-pkcs11-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830393" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830394" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830395" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830396" comment="bind-sdb-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830397" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830398" comment="bind-utils-9.11.4-26.P2.el7_9.15 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1327" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5736.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5736.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830399" comment="java-11-openjdk-11.0.21.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830400" comment="java-11-openjdk-demo-11.0.21.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830401" comment="java-11-openjdk-devel-11.0.21.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830402" comment="java-11-openjdk-headless-11.0.21.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830403" comment="java-11-openjdk-javadoc-11.0.21.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830404" comment="java-11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830405" comment="java-11-openjdk-jmods-11.0.21.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830406" comment="java-11-openjdk-src-11.0.21.0.9-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830407" comment="java-11-openjdk-static-libs-11.0.21.0.9-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1328" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-22067" ref_url="https://www.suse.com/security/cve/CVE-2023-22067/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:5761.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:5761.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22067/">CVE-2023-22067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22067">CVE-2023-22067 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830408" comment="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830409" comment="java-1.8.0-openjdk-accessibility-1.8.0.392.b08-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830410" comment="java-1.8.0-openjdk-demo-1.8.0.392.b08-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830411" comment="java-1.8.0-openjdk-devel-1.8.0.392.b08-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830412" comment="java-1.8.0-openjdk-headless-1.8.0.392.b08-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830413" comment="java-1.8.0-openjdk-javadoc-1.8.0.392.b08-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830414" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830415" comment="java-1.8.0-openjdk-src-1.8.0.392.b08-2.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1329" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-44488" ref_url="https://www.suse.com/security/cve/CVE-2023-44488/" source="CVE"/>
		<reference ref_id="CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721/" source="CVE"/>
		<reference ref_id="CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724/" source="CVE"/>
		<reference ref_id="CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725/" source="CVE"/>
		<reference ref_id="CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728/" source="CVE"/>
		<reference ref_id="CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730/" source="CVE"/>
		<reference ref_id="CVE-2023-5732" ref_url="https://www.suse.com/security/cve/CVE-2023-5732/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6162.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6162.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44488/">CVE-2023-44488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44488">CVE-2023-44488 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5732/">CVE-2023-5732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5732">CVE-2023-5732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830416" comment="firefox-115.4.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1330" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<description>
This security update provides a functional equivalent of RHSA-2023:6193.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6193.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830417" comment="thunderbird-115.4.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1331" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-5367" ref_url="https://www.suse.com/security/cve/CVE-2023-5367/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6802.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6802.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5367/">CVE-2023-5367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830418" comment="xorg-x11-server-Xdmx-1.20.4-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830419" comment="xorg-x11-server-Xephyr-1.20.4-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830420" comment="xorg-x11-server-Xnest-1.20.4-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830421" comment="xorg-x11-server-Xorg-1.20.4-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830422" comment="xorg-x11-server-Xvfb-1.20.4-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830423" comment="xorg-x11-server-Xwayland-1.20.4-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830424" comment="xorg-x11-server-common-1.20.4-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830425" comment="xorg-x11-server-devel-1.20.4-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830426" comment="xorg-x11-server-source-1.20.4-24.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1332" version="1" class="patch">
	<metadata>
		<title>security update for squid (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-46847" ref_url="https://www.suse.com/security/cve/CVE-2023-46847/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6805.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6805.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46847/">CVE-2023-46847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46847">CVE-2023-46847 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830427" comment="squid-3.5.20-17.el7_9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830428" comment="squid-migration-script-3.5.20-17.el7_9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830429" comment="squid-sysvinit-3.5.20-17.el7_9.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1333" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6823.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6823.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830430" comment="python3-3.6.8-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830431" comment="python3-debug-3.6.8-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830432" comment="python3-devel-3.6.8-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830433" comment="python3-idle-3.6.8-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830434" comment="python3-libs-3.6.8-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830435" comment="python3-test-3.6.8-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830436" comment="python3-tkinter-3.6.8-21.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830430" comment="python3-3.6.8-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830431" comment="python3-debug-3.6.8-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830432" comment="python3-devel-3.6.8-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830433" comment="python3-idle-3.6.8-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830434" comment="python3-libs-3.6.8-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830435" comment="python3-test-3.6.8-21.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830436" comment="python3-tkinter-3.6.8-21.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1334" version="1" class="patch">
	<metadata>
		<title>security update for python (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6885.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6885.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830437" comment="python-2.7.5-94.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830438" comment="python-debug-2.7.5-94.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830439" comment="python-devel-2.7.5-94.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830440" comment="python-libs-2.7.5-94.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830441" comment="python-test-2.7.5-94.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830442" comment="python-tools-2.7.5-94.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830443" comment="tkinter-2.7.5-94.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830437" comment="python-2.7.5-94.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830438" comment="python-debug-2.7.5-94.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830439" comment="python-devel-2.7.5-94.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830440" comment="python-libs-2.7.5-94.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830441" comment="python-test-2.7.5-94.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830442" comment="python-tools-2.7.5-94.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830443" comment="tkinter-2.7.5-94.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1335" version="1" class="patch">
	<metadata>
		<title>security update for plexus-archiver (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-37460" ref_url="https://www.suse.com/security/cve/CVE-2023-37460/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:6886.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:6886.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37460/">CVE-2023-37460 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37460">CVE-2023-37460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830444" comment="plexus-archiver-2.4.2-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830445" comment="plexus-archiver-javadoc-2.4.2-6.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830444" comment="plexus-archiver-2.4.2-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830445" comment="plexus-archiver-javadoc-2.4.2-6.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1336" version="1" class="patch">
	<metadata>
		<title>security update for open-vm-tools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-34058" ref_url="https://www.suse.com/security/cve/CVE-2023-34058/" source="CVE"/>
		<reference ref_id="CVE-2023-34059" ref_url="https://www.suse.com/security/cve/CVE-2023-34059/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7279.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7279.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34058/">CVE-2023-34058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34058">CVE-2023-34058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34059/">CVE-2023-34059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34059">CVE-2023-34059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830446" comment="open-vm-tools-11.0.5-3.el7_9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830447" comment="open-vm-tools-desktop-11.0.5-3.el7_9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830448" comment="open-vm-tools-devel-11.0.5-3.el7_9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830449" comment="open-vm-tools-test-11.0.5-3.el7_9.9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830446" comment="open-vm-tools-11.0.5-3.el7_9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830447" comment="open-vm-tools-desktop-11.0.5-3.el7_9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830448" comment="open-vm-tools-devel-11.0.5-3.el7_9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830449" comment="open-vm-tools-test-11.0.5-3.el7_9.9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1337" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2023-3611" ref_url="https://www.suse.com/security/cve/CVE-2023-3611/" source="CVE"/>
		<reference ref_id="CVE-2023-3776" ref_url="https://www.suse.com/security/cve/CVE-2023-3776/" source="CVE"/>
		<reference ref_id="CVE-2023-4128" ref_url="https://www.suse.com/security/cve/CVE-2023-4128/" source="CVE"/>
		<reference ref_id="CVE-2023-4206" ref_url="https://www.suse.com/security/cve/CVE-2023-4206/" source="CVE"/>
		<reference ref_id="CVE-2023-4207" ref_url="https://www.suse.com/security/cve/CVE-2023-4207/" source="CVE"/>
		<reference ref_id="CVE-2023-4208" ref_url="https://www.suse.com/security/cve/CVE-2023-4208/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7423.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7423.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3611/">CVE-2023-3611 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3776/">CVE-2023-3776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4128/">CVE-2023-4128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4206/">CVE-2023-4206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4206">CVE-2023-4206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4207/">CVE-2023-4207 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4207">CVE-2023-4207 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4208/">CVE-2023-4208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4208">CVE-2023-4208 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830450" comment="bpftool-3.10.0-1160.105.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830451" comment="kernel-3.10.0-1160.105.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830452" comment="kernel-abi-whitelists-3.10.0-1160.105.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830453" comment="kernel-debug-3.10.0-1160.105.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830456" comment="kernel-doc-3.10.0-1160.105.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830457" comment="kernel-headers-3.10.0-1160.105.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830458" comment="kernel-tools-3.10.0-1160.105.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830459" comment="kernel-tools-libs-3.10.0-1160.105.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830461" comment="perf-3.10.0-1160.105.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830462" comment="python-perf-3.10.0-1160.105.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1338" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-5367" ref_url="https://www.suse.com/security/cve/CVE-2023-5367/" source="CVE"/>
		<reference ref_id="CVE-2023-5380" ref_url="https://www.suse.com/security/cve/CVE-2023-5380/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7428.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7428.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5367/">CVE-2023-5367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5380/">CVE-2023-5380 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5380">CVE-2023-5380 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830463" comment="tigervnc-1.8.0-26.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830464" comment="tigervnc-icons-1.8.0-26.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830465" comment="tigervnc-license-1.8.0-26.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830466" comment="tigervnc-server-1.8.0-26.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830467" comment="tigervnc-server-applet-1.8.0-26.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830468" comment="tigervnc-server-minimal-1.8.0-26.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830469" comment="tigervnc-server-module-1.8.0-26.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1339" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-6204" ref_url="https://www.suse.com/security/cve/CVE-2023-6204/" source="CVE"/>
		<reference ref_id="CVE-2023-6205" ref_url="https://www.suse.com/security/cve/CVE-2023-6205/" source="CVE"/>
		<reference ref_id="CVE-2023-6206" ref_url="https://www.suse.com/security/cve/CVE-2023-6206/" source="CVE"/>
		<reference ref_id="CVE-2023-6207" ref_url="https://www.suse.com/security/cve/CVE-2023-6207/" source="CVE"/>
		<reference ref_id="CVE-2023-6208" ref_url="https://www.suse.com/security/cve/CVE-2023-6208/" source="CVE"/>
		<reference ref_id="CVE-2023-6209" ref_url="https://www.suse.com/security/cve/CVE-2023-6209/" source="CVE"/>
		<reference ref_id="CVE-2023-6212" ref_url="https://www.suse.com/security/cve/CVE-2023-6212/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7505.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7505.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6204/">CVE-2023-6204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6204">CVE-2023-6204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6205/">CVE-2023-6205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6205">CVE-2023-6205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6206/">CVE-2023-6206 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6206">CVE-2023-6206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6207/">CVE-2023-6207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6207">CVE-2023-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6208/">CVE-2023-6208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6208">CVE-2023-6208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6209/">CVE-2023-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6209">CVE-2023-6209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6212/">CVE-2023-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6212">CVE-2023-6212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830470" comment="thunderbird-115.5.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1340" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-6204" ref_url="https://www.suse.com/security/cve/CVE-2023-6204/" source="CVE"/>
		<reference ref_id="CVE-2023-6205" ref_url="https://www.suse.com/security/cve/CVE-2023-6205/" source="CVE"/>
		<reference ref_id="CVE-2023-6206" ref_url="https://www.suse.com/security/cve/CVE-2023-6206/" source="CVE"/>
		<reference ref_id="CVE-2023-6207" ref_url="https://www.suse.com/security/cve/CVE-2023-6207/" source="CVE"/>
		<reference ref_id="CVE-2023-6208" ref_url="https://www.suse.com/security/cve/CVE-2023-6208/" source="CVE"/>
		<reference ref_id="CVE-2023-6209" ref_url="https://www.suse.com/security/cve/CVE-2023-6209/" source="CVE"/>
		<reference ref_id="CVE-2023-6212" ref_url="https://www.suse.com/security/cve/CVE-2023-6212/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7509.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7509.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6204/">CVE-2023-6204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6204">CVE-2023-6204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6205/">CVE-2023-6205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6205">CVE-2023-6205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6206/">CVE-2023-6206 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6206">CVE-2023-6206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6207/">CVE-2023-6207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6207">CVE-2023-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6208/">CVE-2023-6208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6208">CVE-2023-6208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6209/">CVE-2023-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6209">CVE-2023-6209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6212/">CVE-2023-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6212">CVE-2023-6212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830471" comment="firefox-115.5.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1341" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7513.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7513.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830472" comment="iwl100-firmware-39.31.5.1-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830473" comment="iwl1000-firmware-39.31.5.1-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830474" comment="iwl105-firmware-18.168.6.1-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830475" comment="iwl135-firmware-18.168.6.1-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830476" comment="iwl2000-firmware-18.168.6.1-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830477" comment="iwl2030-firmware-18.168.6.1-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830478" comment="iwl3160-firmware-25.30.13.0-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830479" comment="iwl3945-firmware-15.32.2.9-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830480" comment="iwl4965-firmware-228.61.2.24-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830481" comment="iwl5000-firmware-8.83.5.1_1-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830482" comment="iwl5150-firmware-8.24.2.2-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830483" comment="iwl6000-firmware-9.221.4.1-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830484" comment="iwl6000g2a-firmware-18.168.6.1-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830485" comment="iwl6000g2b-firmware-18.168.6.1-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830486" comment="iwl6050-firmware-41.28.5.1-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830487" comment="iwl7260-firmware-25.30.13.0-81.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830488" comment="linux-firmware-20200421-81.git78c0348.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1342" version="1" class="patch">
	<metadata>
		<title>security update for curl (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-43552" ref_url="https://www.suse.com/security/cve/CVE-2022-43552/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7743.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7743.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-43552/">CVE-2022-43552 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43552">CVE-2022-43552 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830489" comment="curl-7.29.0-59.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830490" comment="libcurl-7.29.0-59.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830491" comment="libcurl-devel-7.29.0-59.el7_9.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830489" comment="curl-7.29.0-59.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830490" comment="libcurl-7.29.0-59.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830491" comment="libcurl-devel-7.29.0-59.el7_9.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1343" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2023:7783.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2023:7783.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830492" comment="postgresql-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830493" comment="postgresql-contrib-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830494" comment="postgresql-devel-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830495" comment="postgresql-docs-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830496" comment="postgresql-libs-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830497" comment="postgresql-plperl-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830498" comment="postgresql-plpython-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830499" comment="postgresql-pltcl-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830500" comment="postgresql-server-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830501" comment="postgresql-static-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830502" comment="postgresql-test-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830503" comment="postgresql-upgrade-9.2.24-9.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830492" comment="postgresql-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830493" comment="postgresql-contrib-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830494" comment="postgresql-devel-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830495" comment="postgresql-docs-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830496" comment="postgresql-libs-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830497" comment="postgresql-plperl-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830498" comment="postgresql-plpython-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830499" comment="postgresql-pltcl-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830500" comment="postgresql-server-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830501" comment="postgresql-static-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830502" comment="postgresql-test-9.2.24-9.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830503" comment="postgresql-upgrade-9.2.24-9.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1344" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377/" source="CVE"/>
		<reference ref_id="CVE-2023-6478" ref_url="https://www.suse.com/security/cve/CVE-2023-6478/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0006.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0006.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6478/">CVE-2023-6478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830504" comment="tigervnc-1.8.0-28.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830505" comment="tigervnc-icons-1.8.0-28.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830506" comment="tigervnc-license-1.8.0-28.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830507" comment="tigervnc-server-1.8.0-28.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830508" comment="tigervnc-server-applet-1.8.0-28.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830509" comment="tigervnc-server-minimal-1.8.0-28.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830510" comment="tigervnc-server-module-1.8.0-28.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1345" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377/" source="CVE"/>
		<reference ref_id="CVE-2023-6478" ref_url="https://www.suse.com/security/cve/CVE-2023-6478/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0009.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0009.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6478/">CVE-2023-6478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830511" comment="xorg-x11-server-Xdmx-1.20.4-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830512" comment="xorg-x11-server-Xephyr-1.20.4-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830513" comment="xorg-x11-server-Xnest-1.20.4-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830514" comment="xorg-x11-server-Xorg-1.20.4-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830515" comment="xorg-x11-server-Xvfb-1.20.4-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830516" comment="xorg-x11-server-Xwayland-1.20.4-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830517" comment="xorg-x11-server-common-1.20.4-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830518" comment="xorg-x11-server-devel-1.20.4-25.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830519" comment="xorg-x11-server-source-1.20.4-25.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1346" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer1-plugins-bad-free (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-44446" ref_url="https://www.suse.com/security/cve/CVE-2023-44446/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0013.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0013.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44446/">CVE-2023-44446 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44446">CVE-2023-44446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830520" comment="gstreamer1-plugins-bad-free-1.10.4-4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830521" comment="gstreamer1-plugins-bad-free-devel-1.10.4-4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830522" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-4.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830520" comment="gstreamer1-plugins-bad-free-1.10.4-4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830521" comment="gstreamer1-plugins-bad-free-devel-1.10.4-4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830522" comment="gstreamer1-plugins-bad-free-gtk-1.10.4-4.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1347" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-6856" ref_url="https://www.suse.com/security/cve/CVE-2023-6856/" source="CVE"/>
		<reference ref_id="CVE-2023-6857" ref_url="https://www.suse.com/security/cve/CVE-2023-6857/" source="CVE"/>
		<reference ref_id="CVE-2023-6858" ref_url="https://www.suse.com/security/cve/CVE-2023-6858/" source="CVE"/>
		<reference ref_id="CVE-2023-6859" ref_url="https://www.suse.com/security/cve/CVE-2023-6859/" source="CVE"/>
		<reference ref_id="CVE-2023-6860" ref_url="https://www.suse.com/security/cve/CVE-2023-6860/" source="CVE"/>
		<reference ref_id="CVE-2023-6861" ref_url="https://www.suse.com/security/cve/CVE-2023-6861/" source="CVE"/>
		<reference ref_id="CVE-2023-6862" ref_url="https://www.suse.com/security/cve/CVE-2023-6862/" source="CVE"/>
		<reference ref_id="CVE-2023-6863" ref_url="https://www.suse.com/security/cve/CVE-2023-6863/" source="CVE"/>
		<reference ref_id="CVE-2023-6864" ref_url="https://www.suse.com/security/cve/CVE-2023-6864/" source="CVE"/>
		<reference ref_id="CVE-2023-6865" ref_url="https://www.suse.com/security/cve/CVE-2023-6865/" source="CVE"/>
		<reference ref_id="CVE-2023-6867" ref_url="https://www.suse.com/security/cve/CVE-2023-6867/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0026.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0026.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6856/">CVE-2023-6856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6856">CVE-2023-6856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6857/">CVE-2023-6857 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6857">CVE-2023-6857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6858/">CVE-2023-6858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6858">CVE-2023-6858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6859/">CVE-2023-6859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6859">CVE-2023-6859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6860/">CVE-2023-6860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6860">CVE-2023-6860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6861/">CVE-2023-6861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6861">CVE-2023-6861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6862/">CVE-2023-6862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6862">CVE-2023-6862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6863/">CVE-2023-6863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6863">CVE-2023-6863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6864/">CVE-2023-6864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6864">CVE-2023-6864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6865/">CVE-2023-6865 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6865">CVE-2023-6865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6867/">CVE-2023-6867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6867">CVE-2023-6867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830523" comment="firefox-115.6.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1348" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-50761" ref_url="https://www.suse.com/security/cve/CVE-2023-50761/" source="CVE"/>
		<reference ref_id="CVE-2023-50762" ref_url="https://www.suse.com/security/cve/CVE-2023-50762/" source="CVE"/>
		<reference ref_id="CVE-2023-6856" ref_url="https://www.suse.com/security/cve/CVE-2023-6856/" source="CVE"/>
		<reference ref_id="CVE-2023-6857" ref_url="https://www.suse.com/security/cve/CVE-2023-6857/" source="CVE"/>
		<reference ref_id="CVE-2023-6858" ref_url="https://www.suse.com/security/cve/CVE-2023-6858/" source="CVE"/>
		<reference ref_id="CVE-2023-6859" ref_url="https://www.suse.com/security/cve/CVE-2023-6859/" source="CVE"/>
		<reference ref_id="CVE-2023-6860" ref_url="https://www.suse.com/security/cve/CVE-2023-6860/" source="CVE"/>
		<reference ref_id="CVE-2023-6861" ref_url="https://www.suse.com/security/cve/CVE-2023-6861/" source="CVE"/>
		<reference ref_id="CVE-2023-6862" ref_url="https://www.suse.com/security/cve/CVE-2023-6862/" source="CVE"/>
		<reference ref_id="CVE-2023-6863" ref_url="https://www.suse.com/security/cve/CVE-2023-6863/" source="CVE"/>
		<reference ref_id="CVE-2023-6864" ref_url="https://www.suse.com/security/cve/CVE-2023-6864/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0027.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0027.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50761/">CVE-2023-50761 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50761">CVE-2023-50761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50762/">CVE-2023-50762 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50762">CVE-2023-50762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6856/">CVE-2023-6856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6856">CVE-2023-6856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6857/">CVE-2023-6857 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6857">CVE-2023-6857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6858/">CVE-2023-6858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6858">CVE-2023-6858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6859/">CVE-2023-6859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6859">CVE-2023-6859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6860/">CVE-2023-6860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6860">CVE-2023-6860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6861/">CVE-2023-6861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6861">CVE-2023-6861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6862/">CVE-2023-6862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6862">CVE-2023-6862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6863/">CVE-2023-6863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6863">CVE-2023-6863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6864/">CVE-2023-6864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6864">CVE-2023-6864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830524" comment="thunderbird-115.6.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1349" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-5455" ref_url="https://www.suse.com/security/cve/CVE-2023-5455/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0145.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0145.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5455/">CVE-2023-5455 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5455">CVE-2023-5455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830525" comment="ipa-client-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830526" comment="ipa-client-common-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830527" comment="ipa-common-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830528" comment="ipa-python-compat-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830529" comment="ipa-server-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830530" comment="ipa-server-common-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830531" comment="ipa-server-dns-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830532" comment="ipa-server-trust-ad-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830533" comment="python2-ipaclient-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830534" comment="python2-ipalib-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830535" comment="python2-ipaserver-4.6.8-5.el7_9.16 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830525" comment="ipa-client-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830526" comment="ipa-client-common-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830527" comment="ipa-common-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830528" comment="ipa-python-compat-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830529" comment="ipa-server-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830530" comment="ipa-server-common-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830531" comment="ipa-server-dns-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830532" comment="ipa-server-trust-ad-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830533" comment="python2-ipaclient-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830534" comment="python2-ipalib-4.6.8-5.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830535" comment="python2-ipaserver-4.6.8-5.el7_9.16 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1350" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0223.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0223.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830536" comment="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830537" comment="java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830538" comment="java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830539" comment="java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830540" comment="java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830541" comment="java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830542" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830543" comment="java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1351" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0232.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0232.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830544" comment="java-11-openjdk-11.0.22.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830545" comment="java-11-openjdk-devel-11.0.22.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830546" comment="java-11-openjdk-headless-11.0.22.0.7-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1352" version="1" class="patch">
	<metadata>
		<title>security update for gstreamer-plugins-bad-free (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-44446" ref_url="https://www.suse.com/security/cve/CVE-2023-44446/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0279.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0279.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44446/">CVE-2023-44446 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44446">CVE-2023-44446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830547" comment="gstreamer-plugins-bad-free-0.10.23-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830548" comment="gstreamer-plugins-bad-free-devel-0.10.23-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830549" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-24.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830547" comment="gstreamer-plugins-bad-free-0.10.23-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830548" comment="gstreamer-plugins-bad-free-devel-0.10.23-24.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830549" comment="gstreamer-plugins-bad-free-devel-docs-0.10.23-24.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1353" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-6816" ref_url="https://www.suse.com/security/cve/CVE-2023-6816/" source="CVE"/>
		<reference ref_id="CVE-2024-0229" ref_url="https://www.suse.com/security/cve/CVE-2024-0229/" source="CVE"/>
		<reference ref_id="CVE-2024-0408" ref_url="https://www.suse.com/security/cve/CVE-2024-0408/" source="CVE"/>
		<reference ref_id="CVE-2024-0409" ref_url="https://www.suse.com/security/cve/CVE-2024-0409/" source="CVE"/>
		<reference ref_id="CVE-2024-21885" ref_url="https://www.suse.com/security/cve/CVE-2024-21885/" source="CVE"/>
		<reference ref_id="CVE-2024-21886" ref_url="https://www.suse.com/security/cve/CVE-2024-21886/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0320.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0320.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6816/">CVE-2023-6816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0229/">CVE-2024-0229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0408/">CVE-2024-0408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0408">CVE-2024-0408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0409/">CVE-2024-0409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0409">CVE-2024-0409 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21885/">CVE-2024-21885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21886/">CVE-2024-21886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009830550" comment="xorg-x11-server-Xdmx-1.20.4-27.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830551" comment="xorg-x11-server-Xephyr-1.20.4-27.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830552" comment="xorg-x11-server-Xnest-1.20.4-27.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830553" comment="xorg-x11-server-Xorg-1.20.4-27.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830554" comment="xorg-x11-server-Xvfb-1.20.4-27.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830555" comment="xorg-x11-server-Xwayland-1.20.4-27.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830556" comment="xorg-x11-server-common-1.20.4-27.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830557" comment="xorg-x11-server-devel-1.20.4-27.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009830558" comment="xorg-x11-server-source-1.20.4-27.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1354" version="1" class="patch">
	<metadata>
		<title>security update for LibRaw (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2021-32142" ref_url="https://www.suse.com/security/cve/CVE-2021-32142/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0343.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0343.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-32142/">CVE-2021-32142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32142">CVE-2021-32142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844291" comment="LibRaw-0.19.4-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844292" comment="LibRaw-devel-0.19.4-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844293" comment="LibRaw-static-0.19.4-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844291" comment="LibRaw-0.19.4-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844292" comment="LibRaw-devel-0.19.4-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844293" comment="LibRaw-static-0.19.4-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1355" version="1" class="patch">
	<metadata>
		<title>security update for python-pillow (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-44271" ref_url="https://www.suse.com/security/cve/CVE-2023-44271/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0345.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0345.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44271/">CVE-2023-44271 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44271">CVE-2023-44271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849764" comment="python-pillow-2.0.0-24.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849765" comment="python-pillow-devel-2.0.0-24.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849766" comment="python-pillow-doc-2.0.0-24.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849767" comment="python-pillow-qt-2.0.0-24.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849768" comment="python-pillow-sane-2.0.0-24.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849769" comment="python-pillow-tk-2.0.0-24.gitd1c6db8.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1356" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0346.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0346.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844447" comment="bpftool-3.10.0-1160.108.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844448" comment="kernel-3.10.0-1160.108.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844449" comment="kernel-abi-whitelists-3.10.0-1160.108.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844450" comment="kernel-debug-3.10.0-1160.108.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844453" comment="kernel-doc-3.10.0-1160.108.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844454" comment="kernel-headers-3.10.0-1160.108.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844455" comment="kernel-tools-3.10.0-1160.108.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844456" comment="kernel-tools-libs-3.10.0-1160.108.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844458" comment="perf-3.10.0-1160.108.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844459" comment="python-perf-3.10.0-1160.108.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1357" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2024-0741" ref_url="https://www.suse.com/security/cve/CVE-2024-0741/" source="CVE"/>
		<reference ref_id="CVE-2024-0742" ref_url="https://www.suse.com/security/cve/CVE-2024-0742/" source="CVE"/>
		<reference ref_id="CVE-2024-0746" ref_url="https://www.suse.com/security/cve/CVE-2024-0746/" source="CVE"/>
		<reference ref_id="CVE-2024-0747" ref_url="https://www.suse.com/security/cve/CVE-2024-0747/" source="CVE"/>
		<reference ref_id="CVE-2024-0749" ref_url="https://www.suse.com/security/cve/CVE-2024-0749/" source="CVE"/>
		<reference ref_id="CVE-2024-0750" ref_url="https://www.suse.com/security/cve/CVE-2024-0750/" source="CVE"/>
		<reference ref_id="CVE-2024-0751" ref_url="https://www.suse.com/security/cve/CVE-2024-0751/" source="CVE"/>
		<reference ref_id="CVE-2024-0753" ref_url="https://www.suse.com/security/cve/CVE-2024-0753/" source="CVE"/>
		<reference ref_id="CVE-2024-0755" ref_url="https://www.suse.com/security/cve/CVE-2024-0755/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0600.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0600.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0741/">CVE-2024-0741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0741">CVE-2024-0741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0742/">CVE-2024-0742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0742">CVE-2024-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0746/">CVE-2024-0746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0746">CVE-2024-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0747/">CVE-2024-0747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0747">CVE-2024-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0749/">CVE-2024-0749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0749">CVE-2024-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0750/">CVE-2024-0750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0750">CVE-2024-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0751/">CVE-2024-0751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0751">CVE-2024-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0753/">CVE-2024-0753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0753">CVE-2024-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0755/">CVE-2024-0755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0755">CVE-2024-0755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845118" comment="firefox-115.7.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1358" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2024-0741" ref_url="https://www.suse.com/security/cve/CVE-2024-0741/" source="CVE"/>
		<reference ref_id="CVE-2024-0742" ref_url="https://www.suse.com/security/cve/CVE-2024-0742/" source="CVE"/>
		<reference ref_id="CVE-2024-0746" ref_url="https://www.suse.com/security/cve/CVE-2024-0746/" source="CVE"/>
		<reference ref_id="CVE-2024-0747" ref_url="https://www.suse.com/security/cve/CVE-2024-0747/" source="CVE"/>
		<reference ref_id="CVE-2024-0749" ref_url="https://www.suse.com/security/cve/CVE-2024-0749/" source="CVE"/>
		<reference ref_id="CVE-2024-0750" ref_url="https://www.suse.com/security/cve/CVE-2024-0750/" source="CVE"/>
		<reference ref_id="CVE-2024-0751" ref_url="https://www.suse.com/security/cve/CVE-2024-0751/" source="CVE"/>
		<reference ref_id="CVE-2024-0753" ref_url="https://www.suse.com/security/cve/CVE-2024-0753/" source="CVE"/>
		<reference ref_id="CVE-2024-0755" ref_url="https://www.suse.com/security/cve/CVE-2024-0755/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0601.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0601.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0741/">CVE-2024-0741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0741">CVE-2024-0741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0742/">CVE-2024-0742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0742">CVE-2024-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0746/">CVE-2024-0746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0746">CVE-2024-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0747/">CVE-2024-0747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0747">CVE-2024-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0749/">CVE-2024-0749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0749">CVE-2024-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0750/">CVE-2024-0750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0750">CVE-2024-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0751/">CVE-2024-0751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0751">CVE-2024-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0753/">CVE-2024-0753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0753">CVE-2024-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0755/">CVE-2024-0755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0755">CVE-2024-0755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846116" comment="thunderbird-115.7.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1359" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-6816" ref_url="https://www.suse.com/security/cve/CVE-2023-6816/" source="CVE"/>
		<reference ref_id="CVE-2024-0229" ref_url="https://www.suse.com/security/cve/CVE-2024-0229/" source="CVE"/>
		<reference ref_id="CVE-2024-21885" ref_url="https://www.suse.com/security/cve/CVE-2024-21885/" source="CVE"/>
		<reference ref_id="CVE-2024-21886" ref_url="https://www.suse.com/security/cve/CVE-2024-21886/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0629.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0629.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6816/">CVE-2023-6816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0229/">CVE-2024-0229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21885/">CVE-2024-21885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21886/">CVE-2024-21886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846117" comment="tigervnc-1.8.0-31.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846118" comment="tigervnc-icons-1.8.0-31.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846119" comment="tigervnc-license-1.8.0-31.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846120" comment="tigervnc-server-1.8.0-31.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846121" comment="tigervnc-server-applet-1.8.0-31.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846122" comment="tigervnc-server-minimal-1.8.0-31.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846123" comment="tigervnc-server-module-1.8.0-31.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1360" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-20592" ref_url="https://www.suse.com/security/cve/CVE-2023-20592/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0753.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0753.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20592/">CVE-2023-20592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20592">CVE-2023-20592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846124" comment="iwl100-firmware-39.31.5.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846125" comment="iwl1000-firmware-39.31.5.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846126" comment="iwl105-firmware-18.168.6.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846127" comment="iwl135-firmware-18.168.6.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846128" comment="iwl2000-firmware-18.168.6.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846129" comment="iwl2030-firmware-18.168.6.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846130" comment="iwl3160-firmware-25.30.13.0-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846131" comment="iwl3945-firmware-15.32.2.9-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846132" comment="iwl4965-firmware-228.61.2.24-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846133" comment="iwl5000-firmware-8.83.5.1_1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846134" comment="iwl5150-firmware-8.24.2.2-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846135" comment="iwl6000-firmware-9.221.4.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846136" comment="iwl6000g2a-firmware-18.168.6.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846137" comment="iwl6000g2b-firmware-18.168.6.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846138" comment="iwl6050-firmware-41.28.5.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846139" comment="iwl7260-firmware-25.30.13.0-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846140" comment="linux-firmware-20200421-82.git78c0348.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846124" comment="iwl100-firmware-39.31.5.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846125" comment="iwl1000-firmware-39.31.5.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846126" comment="iwl105-firmware-18.168.6.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846127" comment="iwl135-firmware-18.168.6.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846128" comment="iwl2000-firmware-18.168.6.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846129" comment="iwl2030-firmware-18.168.6.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846130" comment="iwl3160-firmware-25.30.13.0-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846131" comment="iwl3945-firmware-15.32.2.9-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846132" comment="iwl4965-firmware-228.61.2.24-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846133" comment="iwl5000-firmware-8.83.5.1_1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846134" comment="iwl5150-firmware-8.24.2.2-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846135" comment="iwl6000-firmware-9.221.4.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846136" comment="iwl6000g2a-firmware-18.168.6.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846137" comment="iwl6000g2b-firmware-18.168.6.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846138" comment="iwl6050-firmware-41.28.5.1-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846139" comment="iwl7260-firmware-25.30.13.0-82.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846140" comment="linux-firmware-20200421-82.git78c0348.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1361" version="1" class="patch">
	<metadata>
		<title>security update for python-pillow (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-50447" ref_url="https://www.suse.com/security/cve/CVE-2023-50447/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0857.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0857.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50447/">CVE-2023-50447 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50447">CVE-2023-50447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849770" comment="python-pillow-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849771" comment="python-pillow-devel-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849772" comment="python-pillow-doc-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849773" comment="python-pillow-qt-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849774" comment="python-pillow-sane-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849775" comment="python-pillow-tk-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849770" comment="python-pillow-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849771" comment="python-pillow-devel-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849772" comment="python-pillow-doc-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849773" comment="python-pillow-qt-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849774" comment="python-pillow-sane-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849775" comment="python-pillow-tk-2.0.0-25.gitd1c6db8.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1362" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546/" source="CVE"/>
		<reference ref_id="CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547/" source="CVE"/>
		<reference ref_id="CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548/" source="CVE"/>
		<reference ref_id="CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549/" source="CVE"/>
		<reference ref_id="CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550/" source="CVE"/>
		<reference ref_id="CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551/" source="CVE"/>
		<reference ref_id="CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552/" source="CVE"/>
		<reference ref_id="CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0957.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0957.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849776" comment="thunderbird-115.8.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1363" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546/" source="CVE"/>
		<reference ref_id="CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547/" source="CVE"/>
		<reference ref_id="CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548/" source="CVE"/>
		<reference ref_id="CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549/" source="CVE"/>
		<reference ref_id="CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550/" source="CVE"/>
		<reference ref_id="CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551/" source="CVE"/>
		<reference ref_id="CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552/" source="CVE"/>
		<reference ref_id="CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:0976.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:0976.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849777" comment="firefox-115.8.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1364" version="1" class="patch">
	<metadata>
		<title>security update for tuned (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-52337" ref_url="https://www.suse.com/security/cve/CVE-2024-52337/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10381.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10381.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52337/">CVE-2024-52337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52337">CVE-2024-52337 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956837" comment="tuned-2.11.0-13.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956838" comment="tuned-gtk-2.11.0-13.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956839" comment="tuned-profiles-atomic-2.11.0-13.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956840" comment="tuned-profiles-compat-2.11.0-13.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956841" comment="tuned-profiles-cpu-partitioning-2.11.0-13.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956842" comment="tuned-profiles-mssql-2.11.0-13.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956843" comment="tuned-profiles-oracle-2.11.0-13.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956844" comment="tuned-utils-2.11.0-13.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956845" comment="tuned-utils-systemtap-2.11.0-13.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1365" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:10882.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:10882.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958972" comment="postgresql-9.2.24-9.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958973" comment="postgresql-contrib-9.2.24-9.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958974" comment="postgresql-devel-9.2.24-9.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958975" comment="postgresql-docs-9.2.24-9.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958976" comment="postgresql-libs-9.2.24-9.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958977" comment="postgresql-plperl-9.2.24-9.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958978" comment="postgresql-plpython-9.2.24-9.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958979" comment="postgresql-pltcl-9.2.24-9.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958980" comment="postgresql-server-9.2.24-9.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958981" comment="postgresql-static-9.2.24-9.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958982" comment="postgresql-test-9.2.24-9.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958983" comment="postgresql-upgrade-9.2.24-9.el7_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1366" version="1" class="patch">
	<metadata>
		<title>security update for unbound (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11003.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11003.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959700" comment="unbound-1.6.6-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959701" comment="unbound-devel-1.6.6-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959702" comment="unbound-libs-1.6.6-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959703" comment="unbound-python-1.6.6-5.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1367" version="1" class="patch">
	<metadata>
		<title>security update for python-virtualenv (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-53899" ref_url="https://www.suse.com/security/cve/CVE-2024-53899/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:11048.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:11048.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53899/">CVE-2024-53899 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53899">CVE-2024-53899 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958158" comment="python-virtualenv-15.1.0-7.el7_9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1368" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-42896" ref_url="https://www.suse.com/security/cve/CVE-2022-42896/" source="CVE"/>
		<reference ref_id="CVE-2023-38409" ref_url="https://www.suse.com/security/cve/CVE-2023-38409/" source="CVE"/>
		<reference ref_id="CVE-2023-45871" ref_url="https://www.suse.com/security/cve/CVE-2023-45871/" source="CVE"/>
		<reference ref_id="CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921/" source="CVE"/>
		<reference ref_id="CVE-2024-1086" ref_url="https://www.suse.com/security/cve/CVE-2024-1086/" source="CVE"/>
		<reference ref_id="CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1249.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1249.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-42896/">CVE-2022-42896 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42896">CVE-2022-42896 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38409/">CVE-2023-38409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38409">CVE-2023-38409 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45871/">CVE-2023-45871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1086/">CVE-2024-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851792" comment="bpftool-3.10.0-1160.114.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851793" comment="kernel-3.10.0-1160.114.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851794" comment="kernel-abi-whitelists-3.10.0-1160.114.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851795" comment="kernel-debug-3.10.0-1160.114.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851798" comment="kernel-doc-3.10.0-1160.114.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851799" comment="kernel-headers-3.10.0-1160.114.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851800" comment="kernel-tools-3.10.0-1160.114.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851801" comment="kernel-tools-libs-3.10.0-1160.114.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851803" comment="perf-3.10.0-1160.114.2.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851804" comment="python-perf-3.10.0-1160.114.2.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1369" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="CVE-2024-0743" ref_url="https://www.suse.com/security/cve/CVE-2024-0743/" source="CVE"/>
		<reference ref_id="CVE-2024-2607" ref_url="https://www.suse.com/security/cve/CVE-2024-2607/" source="CVE"/>
		<reference ref_id="CVE-2024-2608" ref_url="https://www.suse.com/security/cve/CVE-2024-2608/" source="CVE"/>
		<reference ref_id="CVE-2024-2610" ref_url="https://www.suse.com/security/cve/CVE-2024-2610/" source="CVE"/>
		<reference ref_id="CVE-2024-2611" ref_url="https://www.suse.com/security/cve/CVE-2024-2611/" source="CVE"/>
		<reference ref_id="CVE-2024-2612" ref_url="https://www.suse.com/security/cve/CVE-2024-2612/" source="CVE"/>
		<reference ref_id="CVE-2024-2614" ref_url="https://www.suse.com/security/cve/CVE-2024-2614/" source="CVE"/>
		<reference ref_id="CVE-2024-2616" ref_url="https://www.suse.com/security/cve/CVE-2024-2616/" source="CVE"/>
		<reference ref_id="CVE-2024-29944" ref_url="https://www.suse.com/security/cve/CVE-2024-29944/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1486.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1486.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0743/">CVE-2024-0743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0743">CVE-2024-0743 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2607/">CVE-2024-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2607">CVE-2024-2607 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2608/">CVE-2024-2608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2608">CVE-2024-2608 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2610/">CVE-2024-2610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2610">CVE-2024-2610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2611/">CVE-2024-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2611">CVE-2024-2611 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2612/">CVE-2024-2612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2612">CVE-2024-2612 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2614/">CVE-2024-2614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2614">CVE-2024-2614 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-2616/">CVE-2024-2616 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2616">CVE-2024-2616 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-29944/">CVE-2024-29944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29944">CVE-2024-29944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852714" comment="firefox-115.9.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1370" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="CVE-2024-0743" ref_url="https://www.suse.com/security/cve/CVE-2024-0743/" source="CVE"/>
		<reference ref_id="CVE-2024-1936" ref_url="https://www.suse.com/security/cve/CVE-2024-1936/" source="CVE"/>
		<reference ref_id="CVE-2024-2607" ref_url="https://www.suse.com/security/cve/CVE-2024-2607/" source="CVE"/>
		<reference ref_id="CVE-2024-2608" ref_url="https://www.suse.com/security/cve/CVE-2024-2608/" source="CVE"/>
		<reference ref_id="CVE-2024-2610" ref_url="https://www.suse.com/security/cve/CVE-2024-2610/" source="CVE"/>
		<reference ref_id="CVE-2024-2611" ref_url="https://www.suse.com/security/cve/CVE-2024-2611/" source="CVE"/>
		<reference ref_id="CVE-2024-2612" ref_url="https://www.suse.com/security/cve/CVE-2024-2612/" source="CVE"/>
		<reference ref_id="CVE-2024-2614" ref_url="https://www.suse.com/security/cve/CVE-2024-2614/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1498.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1498.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0743/">CVE-2024-0743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0743">CVE-2024-0743 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1936/">CVE-2024-1936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1936">CVE-2024-1936 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2607/">CVE-2024-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2607">CVE-2024-2607 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2608/">CVE-2024-2608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2608">CVE-2024-2608 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2610/">CVE-2024-2610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2610">CVE-2024-2610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2611/">CVE-2024-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2611">CVE-2024-2611 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2612/">CVE-2024-2612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2612">CVE-2024-2612 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2614/">CVE-2024-2614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2614">CVE-2024-2614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851985" comment="thunderbird-115.9.0-1.el7_9 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1371" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1785.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1785.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854308" comment="xorg-x11-server-Xdmx-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854309" comment="xorg-x11-server-Xephyr-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854310" comment="xorg-x11-server-Xnest-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854311" comment="xorg-x11-server-Xorg-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854312" comment="xorg-x11-server-Xvfb-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854313" comment="xorg-x11-server-Xwayland-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854314" comment="xorg-x11-server-common-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854315" comment="xorg-x11-server-devel-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854316" comment="xorg-x11-server-source-1.20.4-29.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854308" comment="xorg-x11-server-Xdmx-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854309" comment="xorg-x11-server-Xephyr-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854310" comment="xorg-x11-server-Xnest-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854311" comment="xorg-x11-server-Xorg-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854312" comment="xorg-x11-server-Xvfb-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854313" comment="xorg-x11-server-Xwayland-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854314" comment="xorg-x11-server-common-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854315" comment="xorg-x11-server-devel-1.20.4-29.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854316" comment="xorg-x11-server-source-1.20.4-29.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1372" version="1" class="patch">
	<metadata>
		<title>security update for squid (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-46724" ref_url="https://www.suse.com/security/cve/CVE-2023-46724/" source="CVE"/>
		<reference ref_id="CVE-2023-46728" ref_url="https://www.suse.com/security/cve/CVE-2023-46728/" source="CVE"/>
		<reference ref_id="CVE-2023-49285" ref_url="https://www.suse.com/security/cve/CVE-2023-49285/" source="CVE"/>
		<reference ref_id="CVE-2023-49286" ref_url="https://www.suse.com/security/cve/CVE-2023-49286/" source="CVE"/>
		<reference ref_id="CVE-2023-50269" ref_url="https://www.suse.com/security/cve/CVE-2023-50269/" source="CVE"/>
		<reference ref_id="CVE-2024-25617" ref_url="https://www.suse.com/security/cve/CVE-2024-25617/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1787.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1787.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46724/">CVE-2023-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46724">CVE-2023-46724 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46728/">CVE-2023-46728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46728">CVE-2023-46728 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49285/">CVE-2023-49285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49285">CVE-2023-49285 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49286/">CVE-2023-49286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49286">CVE-2023-49286 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50269/">CVE-2023-50269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50269">CVE-2023-50269 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25617/">CVE-2024-25617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25617">CVE-2024-25617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854317" comment="squid-3.5.20-17.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854318" comment="squid-migration-script-3.5.20-17.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854319" comment="squid-sysvinit-3.5.20-17.el7_9.10 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854317" comment="squid-3.5.20-17.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854318" comment="squid-migration-script-3.5.20-17.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854319" comment="squid-sysvinit-3.5.20-17.el7_9.10 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1373" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1817.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1817.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858056" comment="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858057" comment="java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858058" comment="java-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858059" comment="java-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858060" comment="java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858061" comment="java-1.8.0-openjdk-javadoc-1.8.0.412.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858062" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858063" comment="java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858056" comment="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858057" comment="java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858058" comment="java-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858059" comment="java-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858060" comment="java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858061" comment="java-1.8.0-openjdk-javadoc-1.8.0.412.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858062" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858063" comment="java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1374" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1821.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1821.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009856119" comment="java-11-openjdk-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856120" comment="java-11-openjdk-demo-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856121" comment="java-11-openjdk-devel-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856122" comment="java-11-openjdk-headless-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856123" comment="java-11-openjdk-javadoc-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856124" comment="java-11-openjdk-javadoc-zip-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856125" comment="java-11-openjdk-jmods-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856126" comment="java-11-openjdk-src-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856127" comment="java-11-openjdk-static-libs-11.0.23.0.9-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009856119" comment="java-11-openjdk-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856120" comment="java-11-openjdk-demo-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856121" comment="java-11-openjdk-devel-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856122" comment="java-11-openjdk-headless-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856123" comment="java-11-openjdk-javadoc-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856124" comment="java-11-openjdk-javadoc-zip-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856125" comment="java-11-openjdk-jmods-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856126" comment="java-11-openjdk-src-11.0.23.0.9-2.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009856127" comment="java-11-openjdk-static-libs-11.0.23.0.9-2.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1375" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-2609" ref_url="https://www.suse.com/security/cve/CVE-2024-2609/" source="CVE"/>
		<reference ref_id="CVE-2024-3302" ref_url="https://www.suse.com/security/cve/CVE-2024-3302/" source="CVE"/>
		<reference ref_id="CVE-2024-3852" ref_url="https://www.suse.com/security/cve/CVE-2024-3852/" source="CVE"/>
		<reference ref_id="CVE-2024-3854" ref_url="https://www.suse.com/security/cve/CVE-2024-3854/" source="CVE"/>
		<reference ref_id="CVE-2024-3857" ref_url="https://www.suse.com/security/cve/CVE-2024-3857/" source="CVE"/>
		<reference ref_id="CVE-2024-3859" ref_url="https://www.suse.com/security/cve/CVE-2024-3859/" source="CVE"/>
		<reference ref_id="CVE-2024-3861" ref_url="https://www.suse.com/security/cve/CVE-2024-3861/" source="CVE"/>
		<reference ref_id="CVE-2024-3864" ref_url="https://www.suse.com/security/cve/CVE-2024-3864/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:1910.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:1910.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2609/">CVE-2024-2609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2609">CVE-2024-2609 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-3302/">CVE-2024-3302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3302">CVE-2024-3302 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3852/">CVE-2024-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3852">CVE-2024-3852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3854/">CVE-2024-3854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3854">CVE-2024-3854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3857/">CVE-2024-3857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3857">CVE-2024-3857 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3859/">CVE-2024-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3859">CVE-2024-3859 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3861/">CVE-2024-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3861">CVE-2024-3861 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3864/">CVE-2024-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3864">CVE-2024-3864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855857" comment="firefox-115.10.0-1.el7_9 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855857" comment="firefox-115.10.0-1.el7_9 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1376" version="1" class="patch">
	<metadata>
		<title>security update for grub2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-2601" ref_url="https://www.suse.com/security/cve/CVE-2022-2601/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2002.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2002.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2601/">CVE-2022-2601 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601">CVE-2022-2601 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858415" comment="grub2-2.02-0.87.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858416" comment="grub2-common-2.02-0.87.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858417" comment="grub2-efi-ia32-2.02-0.87.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858418" comment="grub2-efi-ia32-cdboot-2.02-0.87.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858419" comment="grub2-efi-ia32-modules-2.02-0.87.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858420" comment="grub2-efi-x64-2.02-0.87.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858421" comment="grub2-efi-x64-cdboot-2.02-0.87.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858422" comment="grub2-efi-x64-modules-2.02-0.87.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858423" comment="grub2-pc-2.02-0.87.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858424" comment="grub2-pc-modules-2.02-0.87.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858425" comment="grub2-tools-2.02-0.87.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858426" comment="grub2-tools-extra-2.02-0.87.el7_9.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858427" comment="grub2-tools-minimal-2.02-0.87.el7_9.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1377" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-36558" ref_url="https://www.suse.com/security/cve/CVE-2020-36558/" source="CVE"/>
		<reference ref_id="CVE-2023-2002" ref_url="https://www.suse.com/security/cve/CVE-2023-2002/" source="CVE"/>
		<reference ref_id="CVE-2023-25775" ref_url="https://www.suse.com/security/cve/CVE-2023-25775/" source="CVE"/>
		<reference ref_id="CVE-2023-4622" ref_url="https://www.suse.com/security/cve/CVE-2023-4622/" source="CVE"/>
		<reference ref_id="CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2004.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2004.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36558/">CVE-2020-36558 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36558">CVE-2020-36558 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2002/">CVE-2023-2002 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25775/">CVE-2023-25775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4622/">CVE-2023-4622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4622">CVE-2023-4622 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858640" comment="bpftool-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858641" comment="kernel-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858642" comment="kernel-abi-whitelists-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858643" comment="kernel-debug-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858646" comment="kernel-doc-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858647" comment="kernel-headers-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858648" comment="kernel-tools-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858649" comment="kernel-tools-libs-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858651" comment="perf-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858652" comment="python-perf-3.10.0-1160.118.1.el7 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858640" comment="bpftool-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858641" comment="kernel-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858642" comment="kernel-abi-whitelists-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858643" comment="kernel-debug-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858646" comment="kernel-doc-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858647" comment="kernel-headers-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858648" comment="kernel-tools-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858649" comment="kernel-tools-libs-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858651" comment="perf-3.10.0-1160.118.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858652" comment="python-perf-3.10.0-1160.118.1.el7 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1378" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2080.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2080.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858653" comment="tigervnc-1.8.0-33.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858654" comment="tigervnc-icons-1.8.0-33.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858655" comment="tigervnc-license-1.8.0-33.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858656" comment="tigervnc-server-1.8.0-33.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858657" comment="tigervnc-server-applet-1.8.0-33.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858658" comment="tigervnc-server-minimal-1.8.0-33.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858659" comment="tigervnc-server-module-1.8.0-33.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858653" comment="tigervnc-1.8.0-33.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858654" comment="tigervnc-icons-1.8.0-33.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858655" comment="tigervnc-license-1.8.0-33.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858656" comment="tigervnc-server-1.8.0-33.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858657" comment="tigervnc-server-applet-1.8.0-33.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858658" comment="tigervnc-server-minimal-1.8.0-33.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858659" comment="tigervnc-server-module-1.8.0-33.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1379" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2024-4367" ref_url="https://www.suse.com/security/cve/CVE-2024-4367/" source="CVE"/>
		<reference ref_id="CVE-2024-4767" ref_url="https://www.suse.com/security/cve/CVE-2024-4767/" source="CVE"/>
		<reference ref_id="CVE-2024-4768" ref_url="https://www.suse.com/security/cve/CVE-2024-4768/" source="CVE"/>
		<reference ref_id="CVE-2024-4769" ref_url="https://www.suse.com/security/cve/CVE-2024-4769/" source="CVE"/>
		<reference ref_id="CVE-2024-4770" ref_url="https://www.suse.com/security/cve/CVE-2024-4770/" source="CVE"/>
		<reference ref_id="CVE-2024-4777" ref_url="https://www.suse.com/security/cve/CVE-2024-4777/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2881.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2881.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4367/">CVE-2024-4367 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4767/">CVE-2024-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4767">CVE-2024-4767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4768/">CVE-2024-4768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4768">CVE-2024-4768 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4769/">CVE-2024-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4769">CVE-2024-4769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4770/">CVE-2024-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4770">CVE-2024-4770 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4777/">CVE-2024-4777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4777">CVE-2024-4777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863197" comment="firefox-115.11.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1380" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2024-4367" ref_url="https://www.suse.com/security/cve/CVE-2024-4367/" source="CVE"/>
		<reference ref_id="CVE-2024-4767" ref_url="https://www.suse.com/security/cve/CVE-2024-4767/" source="CVE"/>
		<reference ref_id="CVE-2024-4768" ref_url="https://www.suse.com/security/cve/CVE-2024-4768/" source="CVE"/>
		<reference ref_id="CVE-2024-4769" ref_url="https://www.suse.com/security/cve/CVE-2024-4769/" source="CVE"/>
		<reference ref_id="CVE-2024-4770" ref_url="https://www.suse.com/security/cve/CVE-2024-4770/" source="CVE"/>
		<reference ref_id="CVE-2024-4777" ref_url="https://www.suse.com/security/cve/CVE-2024-4777/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:2913.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:2913.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4367/">CVE-2024-4367 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4767/">CVE-2024-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4767">CVE-2024-4767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4768/">CVE-2024-4768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4768">CVE-2024-4768 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4769/">CVE-2024-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4769">CVE-2024-4769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4770/">CVE-2024-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4770">CVE-2024-4770 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4777/">CVE-2024-4777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4777">CVE-2024-4777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863198" comment="thunderbird-115.11.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1381" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961/" source="CVE"/>
		<reference ref_id="CVE-2024-33599" ref_url="https://www.suse.com/security/cve/CVE-2024-33599/" source="CVE"/>
		<reference ref_id="CVE-2024-33600" ref_url="https://www.suse.com/security/cve/CVE-2024-33600/" source="CVE"/>
		<reference ref_id="CVE-2024-33601" ref_url="https://www.suse.com/security/cve/CVE-2024-33601/" source="CVE"/>
		<reference ref_id="CVE-2024-33602" ref_url="https://www.suse.com/security/cve/CVE-2024-33602/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3588.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3588.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33599/">CVE-2024-33599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33600/">CVE-2024-33600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33601/">CVE-2024-33601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33602/">CVE-2024-33602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865873" comment="glibc-2.17-326.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865874" comment="glibc-common-2.17-326.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865875" comment="glibc-devel-2.17-326.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865876" comment="glibc-headers-2.17-326.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865877" comment="glibc-static-2.17-326.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865878" comment="glibc-utils-2.17-326.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865879" comment="nscd-2.17-326.el7_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1382" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-2199" ref_url="https://www.suse.com/security/cve/CVE-2024-2199/" source="CVE"/>
		<reference ref_id="CVE-2024-3657" ref_url="https://www.suse.com/security/cve/CVE-2024-3657/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3591.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3591.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2199/">CVE-2024-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2199">CVE-2024-2199 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3657/">CVE-2024-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3657">CVE-2024-3657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865172" comment="389-ds-base-1.3.11.1-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865173" comment="389-ds-base-devel-1.3.11.1-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865174" comment="389-ds-base-libs-1.3.11.1-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865175" comment="389-ds-base-snmp-1.3.11.1-5.el7_9 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865172" comment="389-ds-base-1.3.11.1-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865173" comment="389-ds-base-devel-1.3.11.1-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865174" comment="389-ds-base-libs-1.3.11.1-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865175" comment="389-ds-base-snmp-1.3.11.1-5.el7_9 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1383" version="1" class="patch">
	<metadata>
		<title>security update for less (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-32487" ref_url="https://www.suse.com/security/cve/CVE-2024-32487/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3669.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3669.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32487/">CVE-2024-32487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865176" comment="less-458-10.el7_9 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865176" comment="less-458-10.el7_9 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1384" version="1" class="patch">
	<metadata>
		<title>security update for bind (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-4408" ref_url="https://www.suse.com/security/cve/CVE-2023-4408/" source="CVE"/>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3741.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3741.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4408/">CVE-2023-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4408">CVE-2023-4408 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865880" comment="bind-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865881" comment="bind-chroot-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865882" comment="bind-devel-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865883" comment="bind-dyndb-ldap-11.1-7.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865884" comment="bind-export-devel-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865885" comment="bind-export-libs-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865886" comment="bind-libs-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865887" comment="bind-libs-lite-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865888" comment="bind-license-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865889" comment="bind-lite-devel-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865890" comment="bind-pkcs11-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865891" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865892" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865893" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865894" comment="bind-sdb-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865895" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865896" comment="bind-utils-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865897" comment="dhclient-4.2.5-83.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865898" comment="dhcp-4.2.5-83.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865899" comment="dhcp-common-4.2.5-83.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865900" comment="dhcp-devel-4.2.5-83.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865901" comment="dhcp-libs-4.2.5-83.el7_9.2 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865880" comment="bind-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865881" comment="bind-chroot-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865882" comment="bind-devel-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865883" comment="bind-dyndb-ldap-11.1-7.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865884" comment="bind-export-devel-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865885" comment="bind-export-libs-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865886" comment="bind-libs-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865887" comment="bind-libs-lite-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865888" comment="bind-license-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865889" comment="bind-lite-devel-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865890" comment="bind-pkcs11-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865891" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865892" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865893" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865894" comment="bind-sdb-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865895" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865896" comment="bind-utils-9.11.4-26.P2.el7_9.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865897" comment="dhclient-4.2.5-83.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865898" comment="dhcp-4.2.5-83.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865899" comment="dhcp-common-4.2.5-83.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865900" comment="dhcp-devel-4.2.5-83.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865901" comment="dhcp-libs-4.2.5-83.el7_9.2 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1385" version="1" class="patch">
	<metadata>
		<title>security update for ipa (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2024-3183" ref_url="https://www.suse.com/security/cve/CVE-2024-3183/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3760.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3760.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3183/">CVE-2024-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3183">CVE-2024-3183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865902" comment="ipa-client-4.6.8-5.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865903" comment="ipa-client-common-4.6.8-5.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865904" comment="ipa-common-4.6.8-5.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865905" comment="ipa-python-compat-4.6.8-5.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865906" comment="ipa-server-4.6.8-5.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865907" comment="ipa-server-common-4.6.8-5.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865908" comment="ipa-server-dns-4.6.8-5.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865909" comment="ipa-server-trust-ad-4.6.8-5.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865910" comment="python2-ipaclient-4.6.8-5.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865911" comment="python2-ipalib-4.6.8-5.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865912" comment="python2-ipaserver-4.6.8-5.el7_9.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1386" version="1" class="patch">
	<metadata>
		<title>security update for linux-firmware (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2022-27635" ref_url="https://www.suse.com/security/cve/CVE-2022-27635/" source="CVE"/>
		<reference ref_id="CVE-2022-36351" ref_url="https://www.suse.com/security/cve/CVE-2022-36351/" source="CVE"/>
		<reference ref_id="CVE-2022-38076" ref_url="https://www.suse.com/security/cve/CVE-2022-38076/" source="CVE"/>
		<reference ref_id="CVE-2022-40964" ref_url="https://www.suse.com/security/cve/CVE-2022-40964/" source="CVE"/>
		<reference ref_id="CVE-2022-46329" ref_url="https://www.suse.com/security/cve/CVE-2022-46329/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3939.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3939.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-27635/">CVE-2022-27635 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27635">CVE-2022-27635 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36351/">CVE-2022-36351 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36351">CVE-2022-36351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38076/">CVE-2022-38076 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38076">CVE-2022-38076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40964/">CVE-2022-40964 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40964">CVE-2022-40964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46329/">CVE-2022-46329 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46329">CVE-2022-46329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867116" comment="iwl100-firmware-39.31.5.1-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867117" comment="iwl1000-firmware-39.31.5.1-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867118" comment="iwl105-firmware-18.168.6.1-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867119" comment="iwl135-firmware-18.168.6.1-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867120" comment="iwl2000-firmware-18.168.6.1-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867121" comment="iwl2030-firmware-18.168.6.1-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867122" comment="iwl3160-firmware-25.30.13.0-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867123" comment="iwl3945-firmware-15.32.2.9-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867124" comment="iwl4965-firmware-228.61.2.24-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867125" comment="iwl5000-firmware-8.83.5.1_1-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867126" comment="iwl5150-firmware-8.24.2.2-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867127" comment="iwl6000-firmware-9.221.4.1-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867128" comment="iwl6000g2a-firmware-18.168.6.1-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867129" comment="iwl6000g2b-firmware-18.168.6.1-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867130" comment="iwl6050-firmware-41.28.5.1-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867131" comment="iwl7260-firmware-25.30.13.0-83.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867132" comment="linux-firmware-20200421-83.git78c0348.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1387" version="1" class="patch">
	<metadata>
		<title>security update for firefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2024-5688" ref_url="https://www.suse.com/security/cve/CVE-2024-5688/" source="CVE"/>
		<reference ref_id="CVE-2024-5690" ref_url="https://www.suse.com/security/cve/CVE-2024-5690/" source="CVE"/>
		<reference ref_id="CVE-2024-5691" ref_url="https://www.suse.com/security/cve/CVE-2024-5691/" source="CVE"/>
		<reference ref_id="CVE-2024-5693" ref_url="https://www.suse.com/security/cve/CVE-2024-5693/" source="CVE"/>
		<reference ref_id="CVE-2024-5696" ref_url="https://www.suse.com/security/cve/CVE-2024-5696/" source="CVE"/>
		<reference ref_id="CVE-2024-5700" ref_url="https://www.suse.com/security/cve/CVE-2024-5700/" source="CVE"/>
		<reference ref_id="CVE-2024-5702" ref_url="https://www.suse.com/security/cve/CVE-2024-5702/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3951.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3951.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5688/">CVE-2024-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5688">CVE-2024-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5690/">CVE-2024-5690 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5690">CVE-2024-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5691/">CVE-2024-5691 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5691">CVE-2024-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5693/">CVE-2024-5693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5696/">CVE-2024-5696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5700/">CVE-2024-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5702/">CVE-2024-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5702">CVE-2024-5702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870202" comment="firefox-115.12.0-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1388" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2024-32462" ref_url="https://www.suse.com/security/cve/CVE-2024-32462/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:3980.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:3980.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-32462/">CVE-2024-32462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32462">CVE-2024-32462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868190" comment="flatpak-1.0.9-13.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868191" comment="flatpak-builder-1.0.0-13.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868192" comment="flatpak-devel-1.0.9-13.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868193" comment="flatpak-libs-1.0.9-13.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1389" version="1" class="patch">
	<metadata>
		<title>security update for thunderbird (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7</platform>
		</affected>
		<reference ref_id="CVE-2024-5688" ref_url="https://www.suse.com/security/cve/CVE-2024-5688/" source="CVE"/>
		<reference ref_id="CVE-2024-5690" ref_url="https://www.suse.com/security/cve/CVE-2024-5690/" source="CVE"/>
		<reference ref_id="CVE-2024-5691" ref_url="https://www.suse.com/security/cve/CVE-2024-5691/" source="CVE"/>
		<reference ref_id="CVE-2024-5693" ref_url="https://www.suse.com/security/cve/CVE-2024-5693/" source="CVE"/>
		<reference ref_id="CVE-2024-5696" ref_url="https://www.suse.com/security/cve/CVE-2024-5696/" source="CVE"/>
		<reference ref_id="CVE-2024-5700" ref_url="https://www.suse.com/security/cve/CVE-2024-5700/" source="CVE"/>
		<reference ref_id="CVE-2024-5702" ref_url="https://www.suse.com/security/cve/CVE-2024-5702/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4016.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4016.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5688/">CVE-2024-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5688">CVE-2024-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5690/">CVE-2024-5690 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5690">CVE-2024-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5691/">CVE-2024-5691 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5691">CVE-2024-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5693/">CVE-2024-5693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5696/">CVE-2024-5696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5700/">CVE-2024-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5702/">CVE-2024-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5702">CVE-2024-5702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:7</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869887" comment="thunderbird-115.12.1-1.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1390" version="1" class="patch">
	<metadata>
		<title>security update for pki-core (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-4727" ref_url="https://www.suse.com/security/cve/CVE-2023-4727/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4222.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4222.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4727/">CVE-2023-4727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4727">CVE-2023-4727 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873474" comment="pki-base-10.5.18-32.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873475" comment="pki-base-java-10.5.18-32.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873476" comment="pki-ca-10.5.18-32.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873477" comment="pki-javadoc-10.5.18-32.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873478" comment="pki-kra-10.5.18-32.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873479" comment="pki-server-10.5.18-32.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873480" comment="pki-symkey-10.5.18-32.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873481" comment="pki-tools-10.5.18-32.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1391" version="1" class="patch">
	<metadata>
		<title>security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-33871" ref_url="https://www.suse.com/security/cve/CVE-2024-33871/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4549.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4549.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-33871/">CVE-2024-33871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33871">CVE-2024-33871 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877712" comment="ghostscript-9.25-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877713" comment="ghostscript-cups-9.25-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877714" comment="ghostscript-doc-9.25-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877715" comment="ghostscript-gtk-9.25-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877716" comment="libgs-9.25-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877717" comment="libgs-devel-9.25-5.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1392" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21144" ref_url="https://www.suse.com/security/cve/CVE-2024-21144/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4560.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4560.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21144/">CVE-2024-21144 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21144">CVE-2024-21144 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941589" comment="java-1.8.0-openjdk-1.8.0.422.b05-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941590" comment="java-1.8.0-openjdk-accessibility-1.8.0.422.b05-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941591" comment="java-1.8.0-openjdk-demo-1.8.0.422.b05-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941592" comment="java-1.8.0-openjdk-devel-1.8.0.422.b05-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941593" comment="java-1.8.0-openjdk-headless-1.8.0.422.b05-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941594" comment="java-1.8.0-openjdk-javadoc-1.8.0.422.b05-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941595" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941596" comment="java-1.8.0-openjdk-src-1.8.0.422.b05-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1393" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21144" ref_url="https://www.suse.com/security/cve/CVE-2024-21144/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4564.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4564.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21144/">CVE-2024-21144 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21144">CVE-2024-21144 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880848" comment="java-11-openjdk-11.0.24.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880849" comment="java-11-openjdk-demo-11.0.24.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880850" comment="java-11-openjdk-devel-11.0.24.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880851" comment="java-11-openjdk-headless-11.0.24.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880852" comment="java-11-openjdk-javadoc-11.0.24.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880853" comment="java-11-openjdk-javadoc-zip-11.0.24.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880854" comment="java-11-openjdk-jmods-11.0.24.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880855" comment="java-11-openjdk-src-11.0.24.0.8-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880856" comment="java-11-openjdk-static-libs-11.0.24.0.8-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1394" version="1" class="patch">
	<metadata>
		<title>security update for qt5-qtbase (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-39936" ref_url="https://www.suse.com/security/cve/CVE-2024-39936/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:4647.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:4647.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39936/">CVE-2024-39936 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39936">CVE-2024-39936 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944418" comment="qt5-qtbase-5.9.7-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944419" comment="qt5-qtbase-common-5.9.7-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944420" comment="qt5-qtbase-devel-5.9.7-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944421" comment="qt5-qtbase-doc-5.9.7-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944422" comment="qt5-qtbase-examples-5.9.7-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944423" comment="qt5-qtbase-gui-5.9.7-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944424" comment="qt5-qtbase-mysql-5.9.7-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944425" comment="qt5-qtbase-odbc-5.9.7-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944426" comment="qt5-qtbase-postgresql-5.9.7-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944427" comment="qt5-qtbase-static-5.9.7-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944428" comment="qt5-rpm-macros-5.9.7-6.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1395" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-37370" ref_url="https://www.suse.com/security/cve/CVE-2024-37370/" source="CVE"/>
		<reference ref_id="CVE-2024-37371" ref_url="https://www.suse.com/security/cve/CVE-2024-37371/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:5076.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:5076.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-37370/">CVE-2024-37370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37370">CVE-2024-37370 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37371/">CVE-2024-37371 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880203" comment="krb5-devel-1.15.1-55.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880204" comment="krb5-libs-1.15.1-55.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880205" comment="krb5-pkinit-1.15.1-55.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880206" comment="krb5-server-1.15.1-55.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880207" comment="krb5-server-ldap-1.15.1-55.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880208" comment="krb5-workstation-1.15.1-55.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880209" comment="libkadm5-1.15.1-55.el7_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1396" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-5953" ref_url="https://www.suse.com/security/cve/CVE-2024-5953/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6153.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6153.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5953/">CVE-2024-5953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5953">CVE-2024-5953 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942744" comment="389-ds-base-1.3.11.1-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942745" comment="389-ds-base-devel-1.3.11.1-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942746" comment="389-ds-base-libs-1.3.11.1-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942747" comment="389-ds-base-snmp-1.3.11.1-6.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1397" version="1" class="patch">
	<metadata>
		<title>security update for flatpak (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-42472" ref_url="https://www.suse.com/security/cve/CVE-2024-42472/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6417.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6417.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42472/">CVE-2024-42472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42472">CVE-2024-42472 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942748" comment="flatpak-1.0.9-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942749" comment="flatpak-builder-1.0.0-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942750" comment="flatpak-devel-1.0.9-15.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942751" comment="flatpak-libs-1.0.9-15.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1398" version="1" class="patch">
	<metadata>
		<title>security update for python3-setuptools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6661.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6661.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942557" comment="python3-setuptools-39.2.0-10.el7_9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1399" version="1" class="patch">
	<metadata>
		<title>security update for python-setuptools (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6662.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6662.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942558" comment="python-setuptools-0.9.8-7.el7_9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1400" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-41071" ref_url="https://www.suse.com/security/cve/CVE-2024-41071/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:6994.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:6994.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41071/">CVE-2024-41071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41071">CVE-2024-41071 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945459" comment="bpftool-3.10.0-1160.125.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945460" comment="kernel-3.10.0-1160.125.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945461" comment="kernel-abi-whitelists-3.10.0-1160.125.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945462" comment="kernel-debug-3.10.0-1160.125.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945465" comment="kernel-doc-3.10.0-1160.125.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945466" comment="kernel-headers-3.10.0-1160.125.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945467" comment="kernel-tools-3.10.0-1160.125.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945468" comment="kernel-tools-libs-3.10.0-1160.125.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945470" comment="perf-3.10.0-1160.125.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945471" comment="python-perf-3.10.0-1160.125.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1401" version="1" class="patch">
	<metadata>
		<title>security update for 389-ds-base (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-8445" ref_url="https://www.suse.com/security/cve/CVE-2024-8445/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7434.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7434.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8445/">CVE-2024-8445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8445">CVE-2024-8445 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945525" comment="389-ds-base-1.3.11.1-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945526" comment="389-ds-base-devel-1.3.11.1-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945527" comment="389-ds-base-libs-1.3.11.1-7.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945528" comment="389-ds-base-snmp-1.3.11.1-7.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1402" version="1" class="patch">
	<metadata>
		<title>security update for cups-filters (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-47076" ref_url="https://www.suse.com/security/cve/CVE-2024-47076/" source="CVE"/>
		<reference ref_id="CVE-2024-47175" ref_url="https://www.suse.com/security/cve/CVE-2024-47175/" source="CVE"/>
		<reference ref_id="CVE-2024-47176" ref_url="https://www.suse.com/security/cve/CVE-2024-47176/" source="CVE"/>
		<reference ref_id="CVE-2024-47850" ref_url="https://www.suse.com/security/cve/CVE-2024-47850/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7553.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7553.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47076/">CVE-2024-47076 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47076">CVE-2024-47076 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47175/">CVE-2024-47175 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47175">CVE-2024-47175 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47176/">CVE-2024-47176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47176">CVE-2024-47176 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47850/">CVE-2024-47850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47850">CVE-2024-47850 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947248" comment="cups-filters-1.0.35-29.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947249" comment="cups-filters-devel-1.0.35-29.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947250" comment="cups-filters-libs-1.0.35-29.el7_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1403" version="1" class="patch">
	<metadata>
		<title>security update for systemd (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-26604" ref_url="https://www.suse.com/security/cve/CVE-2023-26604/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:7705.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:7705.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26604/">CVE-2023-26604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26604">CVE-2023-26604 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948422" comment="libgudev1-219-78.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948423" comment="libgudev1-devel-219-78.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948424" comment="systemd-219-78.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948425" comment="systemd-devel-219-78.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948426" comment="systemd-journal-gateway-219-78.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948427" comment="systemd-libs-219-78.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948428" comment="systemd-networkd-219-78.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948429" comment="systemd-python-219-78.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948430" comment="systemd-resolved-219-78.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948431" comment="systemd-sysv-219-78.el7_9.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1404" version="1" class="patch">
	<metadata>
		<title>security update for NetworkManager-libreswan (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-9050" ref_url="https://www.suse.com/security/cve/CVE-2024-9050/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8357.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8357.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9050/">CVE-2024-9050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9050">CVE-2024-9050 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953315" comment="NetworkManager-libreswan-1.2.4-4.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953316" comment="NetworkManager-libreswan-gnome-1.2.4-4.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1405" version="1" class="patch">
	<metadata>
		<title>security update for python-idna (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-3651" ref_url="https://www.suse.com/security/cve/CVE-2024-3651/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8365.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8365.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3651/">CVE-2024-3651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3651">CVE-2024-3651 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950985" comment="python-idna-2.4-2.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1406" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8495.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8495.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953508" comment="postgresql-9.2.24-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953509" comment="postgresql-contrib-9.2.24-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953510" comment="postgresql-devel-9.2.24-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953511" comment="postgresql-docs-9.2.24-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953512" comment="postgresql-libs-9.2.24-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953513" comment="postgresql-plperl-9.2.24-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953514" comment="postgresql-plpython-9.2.24-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953515" comment="postgresql-pltcl-9.2.24-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953516" comment="postgresql-server-9.2.24-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953517" comment="postgresql-static-9.2.24-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953518" comment="postgresql-test-9.2.24-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953519" comment="postgresql-upgrade-9.2.24-9.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1407" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-3596" ref_url="https://www.suse.com/security/cve/CVE-2024-3596/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8788.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8788.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-3596/">CVE-2024-3596 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3596">CVE-2024-3596 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956539" comment="krb5-devel-1.15.1-55.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956540" comment="krb5-libs-1.15.1-55.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956541" comment="krb5-pkinit-1.15.1-55.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956542" comment="krb5-server-1.15.1-55.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956543" comment="krb5-server-ldap-1.15.1-55.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956544" comment="krb5-workstation-1.15.1-55.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956545" comment="libkadm5-1.15.1-55.el7_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1408" version="1" class="patch">
	<metadata>
		<title>security update for xerces-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-37536" ref_url="https://www.suse.com/security/cve/CVE-2023-37536/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:8795.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:8795.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-37536/">CVE-2023-37536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37536">CVE-2023-37536 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009960784" comment="xerces-c-3.1.1-10.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960785" comment="xerces-c-devel-3.1.1-10.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009960786" comment="xerces-c-doc-3.1.1-10.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1409" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Low)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-52530" ref_url="https://www.suse.com/security/cve/CVE-2024-52530/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9654.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9654.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52530/">CVE-2024-52530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52530">CVE-2024-52530 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955234" comment="libsoup-2.62.2-3.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955235" comment="libsoup-devel-2.62.2-3.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1410" version="1" class="patch">
	<metadata>
		<title>security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-45802" ref_url="https://www.suse.com/security/cve/CVE-2024-45802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9738.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9738.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-45802/">CVE-2024-45802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45802">CVE-2024-45802 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957237" comment="squid-3.5.20-17.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957238" comment="squid-migration-script-3.5.20-17.el7_9.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957239" comment="squid-sysvinit-3.5.20-17.el7_9.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1411" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-9632" ref_url="https://www.suse.com/security/cve/CVE-2024-9632/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2024:9901.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2024:9901.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9632/">CVE-2024-9632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9632">CVE-2024-9632 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958984" comment="tigervnc-1.8.0-34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958985" comment="tigervnc-icons-1.8.0-34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958986" comment="tigervnc-license-1.8.0-34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958987" comment="tigervnc-server-1.8.0-34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958988" comment="tigervnc-server-applet-1.8.0-34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958989" comment="tigervnc-server-minimal-1.8.0-34.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958990" comment="tigervnc-server-module-1.8.0-34.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1412" version="1" class="patch">
	<metadata>
		<title>security update for raptor2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-57823" ref_url="https://www.suse.com/security/cve/CVE-2024-57823/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0319.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0319.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57823/">CVE-2024-57823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57823">CVE-2024-57823 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961524" comment="raptor2-2.0.9-5.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961525" comment="raptor2-devel-2.0.9-5.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1413" version="1" class="patch">
	<metadata>
		<title>security update for iperf3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-53580" ref_url="https://www.suse.com/security/cve/CVE-2024-53580/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0402.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0402.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53580/">CVE-2024-53580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53580">CVE-2024-53580 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009961526" comment="iperf3-3.1.7-3.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009961527" comment="iperf3-devel-3.1.7-3.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1414" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-12085" ref_url="https://www.suse.com/security/cve/CVE-2024-12085/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:0714.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:0714.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12085/">CVE-2024-12085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12085">CVE-2024-12085 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009962649" comment="rsync-3.1.2-12.el7_9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1415" version="1" class="patch">
	<metadata>
		<title>security update for microcode_ctl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956/" source="CVE"/>
		<reference ref_id="CVE-2024-43420" ref_url="https://www.suse.com/security/cve/CVE-2024-43420/" source="CVE"/>
		<reference ref_id="CVE-2024-45332" ref_url="https://www.suse.com/security/cve/CVE-2024-45332/" source="CVE"/>
		<reference ref_id="CVE-2025-20012" ref_url="https://www.suse.com/security/cve/CVE-2025-20012/" source="CVE"/>
		<reference ref_id="CVE-2025-20623" ref_url="https://www.suse.com/security/cve/CVE-2025-20623/" source="CVE"/>
		<reference ref_id="CVE-2025-24495" ref_url="https://www.suse.com/security/cve/CVE-2025-24495/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10108.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10108.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-43420/">CVE-2024-43420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43420">CVE-2024-43420 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-45332/">CVE-2024-45332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45332">CVE-2024-45332 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-20012/">CVE-2025-20012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20012">CVE-2025-20012 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20623/">CVE-2025-20623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20623">CVE-2025-20623 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24495/">CVE-2025-24495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24495">CVE-2025-24495 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999889" comment="microcode_ctl-2.1-73.24.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1416" version="1" class="patch">
	<metadata>
		<title>security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-4802" ref_url="https://www.suse.com/security/cve/CVE-2025-4802/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10219.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10219.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4802/">CVE-2025-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4802">CVE-2025-4802 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010007991" comment="glibc-2.17-326.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007992" comment="glibc-common-2.17-326.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007993" comment="glibc-devel-2.17-326.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007994" comment="glibc-headers-2.17-326.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007995" comment="glibc-static-2.17-326.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007996" comment="glibc-utils-2.17-326.el7_9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010007997" comment="nscd-2.17-326.el7_9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1417" version="1" class="patch">
	<metadata>
		<title>security update for pam (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-6020" ref_url="https://www.suse.com/security/cve/CVE-2025-6020/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10357.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10357.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6020/">CVE-2025-6020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6020">CVE-2025-6020 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010009433" comment="pam-1.1.8-23.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009434" comment="pam-devel-1.1.8-23.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1418" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-49175" ref_url="https://www.suse.com/security/cve/CVE-2025-49175/" source="CVE"/>
		<reference ref_id="CVE-2025-49176" ref_url="https://www.suse.com/security/cve/CVE-2025-49176/" source="CVE"/>
		<reference ref_id="CVE-2025-49178" ref_url="https://www.suse.com/security/cve/CVE-2025-49178/" source="CVE"/>
		<reference ref_id="CVE-2025-49179" ref_url="https://www.suse.com/security/cve/CVE-2025-49179/" source="CVE"/>
		<reference ref_id="CVE-2025-49180" ref_url="https://www.suse.com/security/cve/CVE-2025-49180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10360.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10360.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49175/">CVE-2025-49175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49175">CVE-2025-49175 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49176/">CVE-2025-49176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49176">CVE-2025-49176 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49178/">CVE-2025-49178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49178">CVE-2025-49178 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49179/">CVE-2025-49179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49179">CVE-2025-49179 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49180/">CVE-2025-49180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49180">CVE-2025-49180 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010009435" comment="xorg-x11-server-Xdmx-1.20.4-32.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009436" comment="xorg-x11-server-Xephyr-1.20.4-32.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009437" comment="xorg-x11-server-Xnest-1.20.4-32.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009438" comment="xorg-x11-server-Xorg-1.20.4-32.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009439" comment="xorg-x11-server-Xvfb-1.20.4-32.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009440" comment="xorg-x11-server-Xwayland-1.20.4-32.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009441" comment="xorg-x11-server-common-1.20.4-32.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009442" comment="xorg-x11-server-devel-1.20.4-32.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009443" comment="xorg-x11-server-source-1.20.4-32.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1419" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-49175" ref_url="https://www.suse.com/security/cve/CVE-2025-49175/" source="CVE"/>
		<reference ref_id="CVE-2025-49176" ref_url="https://www.suse.com/security/cve/CVE-2025-49176/" source="CVE"/>
		<reference ref_id="CVE-2025-49178" ref_url="https://www.suse.com/security/cve/CVE-2025-49178/" source="CVE"/>
		<reference ref_id="CVE-2025-49179" ref_url="https://www.suse.com/security/cve/CVE-2025-49179/" source="CVE"/>
		<reference ref_id="CVE-2025-49180" ref_url="https://www.suse.com/security/cve/CVE-2025-49180/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10375.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10375.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49175/">CVE-2025-49175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49175">CVE-2025-49175 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49176/">CVE-2025-49176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49176">CVE-2025-49176 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49178/">CVE-2025-49178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49178">CVE-2025-49178 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49179/">CVE-2025-49179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49179">CVE-2025-49179 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49180/">CVE-2025-49180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49180">CVE-2025-49180 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010009444" comment="tigervnc-1.8.0-36.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009445" comment="tigervnc-icons-1.8.0-36.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009446" comment="tigervnc-license-1.8.0-36.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009447" comment="tigervnc-server-1.8.0-36.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009448" comment="tigervnc-server-applet-1.8.0-36.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009449" comment="tigervnc-server-minimal-1.8.0-36.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009450" comment="tigervnc-server-module-1.8.0-36.el7_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1420" version="1" class="patch">
	<metadata>
		<title>security update for libblockdev (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-6019" ref_url="https://www.suse.com/security/cve/CVE-2025-6019/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10796.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10796.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6019/">CVE-2025-6019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6019">CVE-2025-6019 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042371" comment="libblockdev-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042372" comment="libblockdev-btrfs-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042373" comment="libblockdev-btrfs-devel-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042374" comment="libblockdev-crypto-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042375" comment="libblockdev-crypto-devel-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042376" comment="libblockdev-devel-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042377" comment="libblockdev-dm-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042378" comment="libblockdev-dm-devel-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042379" comment="libblockdev-fs-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042380" comment="libblockdev-fs-devel-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042381" comment="libblockdev-kbd-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042382" comment="libblockdev-kbd-devel-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042383" comment="libblockdev-loop-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042384" comment="libblockdev-loop-devel-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042385" comment="libblockdev-lvm-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042386" comment="libblockdev-lvm-devel-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042387" comment="libblockdev-mdraid-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042388" comment="libblockdev-mdraid-devel-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042389" comment="libblockdev-mpath-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042390" comment="libblockdev-mpath-devel-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042391" comment="libblockdev-nvdimm-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042392" comment="libblockdev-nvdimm-devel-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042393" comment="libblockdev-part-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042394" comment="libblockdev-part-devel-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042395" comment="libblockdev-plugins-all-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042396" comment="libblockdev-swap-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042397" comment="libblockdev-swap-devel-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042398" comment="libblockdev-utils-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042399" comment="libblockdev-utils-devel-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042400" comment="libblockdev-vdo-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042401" comment="libblockdev-vdo-devel-2.18-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042402" comment="python2-blockdev-2.18-5.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1421" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-30761" ref_url="https://www.suse.com/security/cve/CVE-2025-30761/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10861.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10861.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-30761/">CVE-2025-30761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30761">CVE-2025-30761 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010010142" comment="java-1.8.0-openjdk-1.8.0.462.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010143" comment="java-1.8.0-openjdk-accessibility-1.8.0.462.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010144" comment="java-1.8.0-openjdk-demo-1.8.0.462.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010145" comment="java-1.8.0-openjdk-devel-1.8.0.462.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010146" comment="java-1.8.0-openjdk-headless-1.8.0.462.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010147" comment="java-1.8.0-openjdk-javadoc-1.8.0.462.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010148" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010010149" comment="java-1.8.0-openjdk-src-1.8.0.462.b08-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1422" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749/" source="CVE"/>
		<reference ref_id="CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754/" source="CVE"/>
		<reference ref_id="CVE-2025-30761" ref_url="https://www.suse.com/security/cve/CVE-2025-30761/" source="CVE"/>
		<reference ref_id="CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059/" source="CVE"/>
		<reference ref_id="CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10865.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10865.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-30761/">CVE-2025-30761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30761">CVE-2025-30761 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011414" comment="java-11-openjdk-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011166" comment="java-11-openjdk-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011415" comment="java-11-openjdk-demo-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011168" comment="java-11-openjdk-demo-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011169" comment="java-11-openjdk-demo-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011170" comment="java-11-openjdk-demo-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011416" comment="java-11-openjdk-devel-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011172" comment="java-11-openjdk-devel-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011173" comment="java-11-openjdk-devel-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011174" comment="java-11-openjdk-devel-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011175" comment="java-11-openjdk-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011417" comment="java-11-openjdk-headless-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011177" comment="java-11-openjdk-headless-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011178" comment="java-11-openjdk-headless-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011179" comment="java-11-openjdk-headless-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011418" comment="java-11-openjdk-javadoc-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011181" comment="java-11-openjdk-javadoc-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011419" comment="java-11-openjdk-javadoc-zip-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011183" comment="java-11-openjdk-javadoc-zip-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011420" comment="java-11-openjdk-jmods-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011185" comment="java-11-openjdk-jmods-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011186" comment="java-11-openjdk-jmods-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011187" comment="java-11-openjdk-jmods-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011188" comment="java-11-openjdk-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011421" comment="java-11-openjdk-src-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011190" comment="java-11-openjdk-src-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011191" comment="java-11-openjdk-src-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011192" comment="java-11-openjdk-src-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011422" comment="java-11-openjdk-static-libs-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011194" comment="java-11-openjdk-static-libs-debug-11.0.28.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011195" comment="java-11-openjdk-static-libs-fastdebug-11.0.28.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011196" comment="java-11-openjdk-static-libs-slowdebug-11.0.28.0.6-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1423" version="1" class="patch">
	<metadata>
		<title>security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-32462" ref_url="https://www.suse.com/security/cve/CVE-2025-32462/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:10871.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:10871.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32462/">CVE-2025-32462 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32462">CVE-2025-32462 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010006275" comment="sudo-1.8.23-10.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010006276" comment="sudo-devel-1.8.23-10.el7_9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1424" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-50066" ref_url="https://www.suse.com/security/cve/CVE-2022-50066/" source="CVE"/>
		<reference ref_id="CVE-2025-22004" ref_url="https://www.suse.com/security/cve/CVE-2025-22004/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11358.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11358.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50066/">CVE-2022-50066 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50066">CVE-2022-50066 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22004/">CVE-2025-22004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22004">CVE-2025-22004 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010008281" comment="bpftool-3.10.0-1160.136.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008282" comment="kernel-3.10.0-1160.136.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008283" comment="kernel-abi-whitelists-3.10.0-1160.136.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008284" comment="kernel-debug-3.10.0-1160.136.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008287" comment="kernel-doc-3.10.0-1160.136.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008288" comment="kernel-headers-3.10.0-1160.136.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008289" comment="kernel-tools-3.10.0-1160.136.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008290" comment="kernel-tools-libs-3.10.0-1160.136.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008292" comment="perf-3.10.0-1160.136.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010008293" comment="python-perf-3.10.0-1160.136.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1425" version="1" class="patch">
	<metadata>
		<title>security update for python3-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-47273" ref_url="https://www.suse.com/security/cve/CVE-2025-47273/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11607.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11607.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47273/">CVE-2025-47273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47273">CVE-2025-47273 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014484" comment="python3-setuptools-39.2.0-10.el7_9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1426" version="1" class="patch">
	<metadata>
		<title>security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-48384" ref_url="https://www.suse.com/security/cve/CVE-2025-48384/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11688.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11688.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48384/">CVE-2025-48384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48384">CVE-2025-48384 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014485" comment="emacs-git-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014486" comment="emacs-git-el-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014487" comment="git-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014488" comment="git-all-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014489" comment="git-bzr-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014490" comment="git-cvs-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014491" comment="git-daemon-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014492" comment="git-email-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014493" comment="git-gnome-keyring-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014494" comment="git-gui-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014495" comment="git-hg-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014496" comment="git-instaweb-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014497" comment="git-p4-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014498" comment="git-svn-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014499" comment="gitk-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014500" comment="gitweb-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014501" comment="perl-Git-1.8.3.1-25.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014502" comment="perl-Git-SVN-1.8.3.1-25.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1427" version="1" class="patch">
	<metadata>
		<title>security update for python-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-47273" ref_url="https://www.suse.com/security/cve/CVE-2025-47273/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:11984.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:11984.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47273/">CVE-2025-47273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47273">CVE-2025-47273 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010013083" comment="python-setuptools-0.9.8-7.el7_9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1428" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-32414" ref_url="https://www.suse.com/security/cve/CVE-2025-32414/" source="CVE"/>
		<reference ref_id="CVE-2025-49794" ref_url="https://www.suse.com/security/cve/CVE-2025-49794/" source="CVE"/>
		<reference ref_id="CVE-2025-49796" ref_url="https://www.suse.com/security/cve/CVE-2025-49796/" source="CVE"/>
		<reference ref_id="CVE-2025-6021" ref_url="https://www.suse.com/security/cve/CVE-2025-6021/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12240.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12240.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-32414/">CVE-2025-32414 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32414">CVE-2025-32414 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49794/">CVE-2025-49794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49794">CVE-2025-49794 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-49796/">CVE-2025-49796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49796">CVE-2025-49796 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6021/">CVE-2025-6021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6021">CVE-2025-6021 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011938" comment="libxml2-2.9.1-6.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011939" comment="libxml2-devel-2.9.1-6.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011940" comment="libxml2-python-2.9.1-6.el7_9.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011941" comment="libxml2-static-2.9.1-6.el7_9.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1429" version="1" class="patch">
	<metadata>
		<title>security update for konsole (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-49091" ref_url="https://www.suse.com/security/cve/CVE-2025-49091/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12346.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12346.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-49091/">CVE-2025-49091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49091">CVE-2025-49091 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010011942" comment="konsole-4.10.5-5.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010011943" comment="konsole-part-4.10.5-5.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1430" version="1" class="patch">
	<metadata>
		<title>security update for sqlite (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-6965" ref_url="https://www.suse.com/security/cve/CVE-2025-6965/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:12349.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:12349.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-6965/">CVE-2025-6965 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6965">CVE-2025-6965 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010012367" comment="lemon-3.7.17-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012368" comment="sqlite-3.7.17-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012369" comment="sqlite-devel-3.7.17-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012370" comment="sqlite-doc-3.7.17-9.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010012371" comment="sqlite-tcl-3.7.17-9.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1431" version="1" class="patch">
	<metadata>
		<title>security update for python-jinja2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-56326" ref_url="https://www.suse.com/security/cve/CVE-2024-56326/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1250.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1250.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56326/">CVE-2024-56326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56326">CVE-2024-56326 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964798" comment="python-jinja2-2.7.2-5.el7_9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1432" version="1" class="patch">
	<metadata>
		<title>Moderate: doxygen security update (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="1850004" ref_url="https://bugzilla.suse.com/1850004" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1255. The original RedHat(R) advisory is available from the RedHat web site at https://access.redhat.com/errata/RHSA-2025:1255		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1850004">SUSE bug 1850004</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009965282" comment="doxygen-1.8.5-4.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965283" comment="doxygen-doxywizard-1.8.5-4.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009965284" comment="doxygen-latex-1.8.5-4.el7_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1433" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-53104" ref_url="https://www.suse.com/security/cve/CVE-2024-53104/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1281.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1281.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53104/">CVE-2024-53104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009964251" comment="bpftool-3.10.0-1160.132.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964252" comment="kernel-3.10.0-1160.132.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964253" comment="kernel-abi-whitelists-3.10.0-1160.132.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964254" comment="kernel-debug-3.10.0-1160.132.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964257" comment="kernel-doc-3.10.0-1160.132.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964258" comment="kernel-headers-3.10.0-1160.132.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964259" comment="kernel-tools-3.10.0-1160.132.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964260" comment="kernel-tools-libs-3.10.0-1160.132.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964262" comment="perf-3.10.0-1160.132.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009964263" comment="python-perf-3.10.0-1160.132.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1434" version="1" class="patch">
	<metadata>
		<title>security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-24528" ref_url="https://www.suse.com/security/cve/CVE-2025-24528/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1352.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1352.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24528/">CVE-2025-24528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">CVE-2025-24528 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009963881" comment="krb5-devel-1.15.1-55.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963882" comment="krb5-libs-1.15.1-55.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963883" comment="krb5-pkinit-1.15.1-55.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963884" comment="krb5-server-1.15.1-55.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963885" comment="krb5-server-ldap-1.15.1-55.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963886" comment="krb5-workstation-1.15.1-55.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009963887" comment="libkadm5-1.15.1-55.el7_9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1435" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-32415" ref_url="https://www.suse.com/security/cve/CVE-2025-32415/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:13789.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:13789.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-32415/">CVE-2025-32415 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32415">CVE-2025-32415 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010018317" comment="libxml2-2.9.1-6.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018318" comment="libxml2-devel-2.9.1-6.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018319" comment="libxml2-python-2.9.1-6.el7_9.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010018320" comment="libxml2-static-2.9.1-6.el7_9.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1436" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-49788" ref_url="https://www.suse.com/security/cve/CVE-2022-49788/" source="CVE"/>
		<reference ref_id="CVE-2022-50020" ref_url="https://www.suse.com/security/cve/CVE-2022-50020/" source="CVE"/>
		<reference ref_id="CVE-2022-50022" ref_url="https://www.suse.com/security/cve/CVE-2022-50022/" source="CVE"/>
		<reference ref_id="CVE-2024-57980" ref_url="https://www.suse.com/security/cve/CVE-2024-57980/" source="CVE"/>
		<reference ref_id="CVE-2025-21928" ref_url="https://www.suse.com/security/cve/CVE-2025-21928/" source="CVE"/>
		<reference ref_id="CVE-2025-23150" ref_url="https://www.suse.com/security/cve/CVE-2025-23150/" source="CVE"/>
		<reference ref_id="CVE-2025-38000" ref_url="https://www.suse.com/security/cve/CVE-2025-38000/" source="CVE"/>
		<reference ref_id="CVE-2025-38177" ref_url="https://www.suse.com/security/cve/CVE-2025-38177/" source="CVE"/>
		<reference ref_id="CVE-2025-38350" ref_url="https://www.suse.com/security/cve/CVE-2025-38350/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14748.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14748.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49788/">CVE-2022-49788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49788">CVE-2022-49788 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50020/">CVE-2022-50020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50020">CVE-2022-50020 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50022/">CVE-2022-50022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50022">CVE-2022-50022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57980/">CVE-2024-57980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57980">CVE-2024-57980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21928/">CVE-2025-21928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21928">CVE-2025-21928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23150/">CVE-2025-23150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23150">CVE-2025-23150 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38000/">CVE-2025-38000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38000">CVE-2025-38000 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38177/">CVE-2025-38177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38177">CVE-2025-38177 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38350/">CVE-2025-38350 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38350">CVE-2025-38350 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010016960" comment="bpftool-3.10.0-1160.137.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016961" comment="kernel-3.10.0-1160.137.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016962" comment="kernel-abi-whitelists-3.10.0-1160.137.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016963" comment="kernel-debug-3.10.0-1160.137.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016966" comment="kernel-doc-3.10.0-1160.137.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016967" comment="kernel-headers-3.10.0-1160.137.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016968" comment="kernel-tools-3.10.0-1160.137.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016969" comment="kernel-tools-libs-3.10.0-1160.137.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016971" comment="perf-3.10.0-1160.137.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010016972" comment="python-perf-3.10.0-1160.137.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1437" version="1" class="patch">
	<metadata>
		<title>security update for libarchive (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-5914" ref_url="https://www.suse.com/security/cve/CVE-2025-5914/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14828.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14828.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5914/">CVE-2025-5914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5914">CVE-2025-5914 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020503" comment="bsdcpio-3.1.2-14.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020504" comment="bsdtar-3.1.2-14.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020505" comment="libarchive-3.1.2-14.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020506" comment="libarchive-devel-3.1.2-14.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1438" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-38079" ref_url="https://www.suse.com/security/cve/CVE-2025-38079/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14987.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14987.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38079/">CVE-2025-38079 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017107" comment="bpftool-3.10.0-1160.138.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017108" comment="kernel-3.10.0-1160.138.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017109" comment="kernel-abi-whitelists-3.10.0-1160.138.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017110" comment="kernel-debug-3.10.0-1160.138.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017113" comment="kernel-doc-3.10.0-1160.138.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017114" comment="kernel-headers-3.10.0-1160.138.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017115" comment="kernel-tools-3.10.0-1160.138.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017116" comment="kernel-tools-libs-3.10.0-1160.138.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017118" comment="perf-3.10.0-1160.138.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017119" comment="python-perf-3.10.0-1160.138.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1439" version="1" class="patch">
	<metadata>
		<title>security update for httpd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-47252" ref_url="https://www.suse.com/security/cve/CVE-2024-47252/" source="CVE"/>
		<reference ref_id="CVE-2025-49812" ref_url="https://www.suse.com/security/cve/CVE-2025-49812/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:14997.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:14997.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47252/">CVE-2024-47252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47252">CVE-2024-47252 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49812/">CVE-2025-49812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49812">CVE-2025-49812 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017223" comment="httpd-2.4.6-99.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017224" comment="httpd-devel-2.4.6-99.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017225" comment="httpd-manual-2.4.6-99.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017226" comment="httpd-tools-2.4.6-99.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017227" comment="mod_ldap-2.4.6-99.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017228" comment="mod_proxy_html-2.4.6-99.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017229" comment="mod_session-2.4.6-99.el7_9.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017230" comment="mod_ssl-2.4.6-99.el7_9.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1440" version="1" class="patch">
	<metadata>
		<title>security update for pam (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-8941" ref_url="https://www.suse.com/security/cve/CVE-2025-8941/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15106.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15106.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8941/">CVE-2025-8941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8941">CVE-2025-8941 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017231" comment="pam-1.1.8-23.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017232" comment="pam-devel-1.1.8-23.el7_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1441" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-38332" ref_url="https://www.suse.com/security/cve/CVE-2025-38332/" source="CVE"/>
		<reference ref_id="CVE-2025-38352" ref_url="https://www.suse.com/security/cve/CVE-2025-38352/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:15648.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:15648.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38332/">CVE-2025-38332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38332">CVE-2025-38332 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38352/">CVE-2025-38352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38352">CVE-2025-38352 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010017846" comment="bpftool-3.10.0-1160.139.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017847" comment="kernel-3.10.0-1160.139.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017848" comment="kernel-abi-whitelists-3.10.0-1160.139.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017849" comment="kernel-debug-3.10.0-1160.139.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017852" comment="kernel-doc-3.10.0-1160.139.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017853" comment="kernel-headers-3.10.0-1160.139.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017854" comment="kernel-tools-3.10.0-1160.139.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017855" comment="kernel-tools-libs-3.10.0-1160.139.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017857" comment="perf-3.10.0-1160.139.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010017858" comment="python-perf-3.10.0-1160.139.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1442" version="1" class="patch">
	<metadata>
		<title>security update for gcc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1601.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1601.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009967089" comment="cpp-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967090" comment="gcc-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967091" comment="gcc-c++-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967092" comment="gcc-gfortran-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967093" comment="gcc-gnat-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967094" comment="gcc-go-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967095" comment="gcc-objc-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967096" comment="gcc-objc++-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967097" comment="gcc-plugin-devel-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967098" comment="libasan-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967099" comment="libasan-static-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967100" comment="libatomic-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967101" comment="libatomic-static-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967102" comment="libgcc-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967103" comment="libgfortran-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967104" comment="libgfortran-static-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967105" comment="libgnat-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967106" comment="libgnat-devel-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967107" comment="libgnat-static-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967108" comment="libgo-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967109" comment="libgo-devel-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967110" comment="libgo-static-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967111" comment="libgomp-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967112" comment="libitm-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967113" comment="libitm-devel-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967114" comment="libitm-static-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967115" comment="libmudflap-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967116" comment="libmudflap-devel-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967117" comment="libmudflap-static-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967118" comment="libobjc-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967119" comment="libquadmath-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967120" comment="libquadmath-devel-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967121" comment="libquadmath-static-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967122" comment="libstdc++-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967123" comment="libstdc++-devel-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967124" comment="libstdc++-docs-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967125" comment="libstdc++-static-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967126" comment="libtsan-4.8.5-45.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009967127" comment="libtsan-static-4.8.5-45.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1443" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:16099.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:16099.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010020296" comment="postgresql-9.2.24-9.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020297" comment="postgresql-contrib-9.2.24-9.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020298" comment="postgresql-devel-9.2.24-9.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020299" comment="postgresql-docs-9.2.24-9.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020300" comment="postgresql-libs-9.2.24-9.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020301" comment="postgresql-plperl-9.2.24-9.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020302" comment="postgresql-plpython-9.2.24-9.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020303" comment="postgresql-pltcl-9.2.24-9.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020304" comment="postgresql-server-9.2.24-9.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020305" comment="postgresql-static-9.2.24-9.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020306" comment="postgresql-test-9.2.24-9.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010020307" comment="postgresql-upgrade-9.2.24-9.el7_9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1444" version="1" class="patch">
	<metadata>
		<title>security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-58060" ref_url="https://www.suse.com/security/cve/CVE-2025-58060/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17054.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17054.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58060/">CVE-2025-58060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58060">CVE-2025-58060 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022020" comment="cups-1.6.3-52.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022021" comment="cups-client-1.6.3-52.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022022" comment="cups-devel-1.6.3-52.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022023" comment="cups-filesystem-1.6.3-52.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022024" comment="cups-ipptool-1.6.3-52.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022025" comment="cups-libs-1.6.3-52.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022026" comment="cups-lpd-1.6.3-52.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1445" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-48701" ref_url="https://www.suse.com/security/cve/CVE-2022-48701/" source="CVE"/>
		<reference ref_id="CVE-2022-50211" ref_url="https://www.suse.com/security/cve/CVE-2022-50211/" source="CVE"/>
		<reference ref_id="CVE-2022-50229" ref_url="https://www.suse.com/security/cve/CVE-2022-50229/" source="CVE"/>
		<reference ref_id="CVE-2023-53125" ref_url="https://www.suse.com/security/cve/CVE-2023-53125/" source="CVE"/>
		<reference ref_id="CVE-2025-38200" ref_url="https://www.suse.com/security/cve/CVE-2025-38200/" source="CVE"/>
		<reference ref_id="CVE-2025-38477" ref_url="https://www.suse.com/security/cve/CVE-2025-38477/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:17161.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:17161.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48701/">CVE-2022-48701 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48701">CVE-2022-48701 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50211/">CVE-2022-50211 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50211">CVE-2022-50211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50229/">CVE-2022-50229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50229">CVE-2022-50229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53125/">CVE-2023-53125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53125">CVE-2023-53125 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38200/">CVE-2025-38200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38200">CVE-2025-38200 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38477/">CVE-2025-38477 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38477">CVE-2025-38477 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010022317" comment="bpftool-3.10.0-1160.141.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022318" comment="kernel-3.10.0-1160.141.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022319" comment="kernel-abi-whitelists-3.10.0-1160.141.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022320" comment="kernel-debug-3.10.0-1160.141.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022323" comment="kernel-doc-3.10.0-1160.141.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022324" comment="kernel-headers-3.10.0-1160.141.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022325" comment="kernel-tools-3.10.0-1160.141.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022326" comment="kernel-tools-libs-3.10.0-1160.141.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022328" comment="perf-3.10.0-1160.141.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010022329" comment="python-perf-3.10.0-1160.141.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1446" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-11187" ref_url="https://www.suse.com/security/cve/CVE-2024-11187/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:1718.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:1718.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11187/">CVE-2024-11187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11187">CVE-2024-11187 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009966015" comment="bind-9.11.4-26.P2.el7_9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966016" comment="bind-chroot-9.11.4-26.P2.el7_9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966017" comment="bind-devel-9.11.4-26.P2.el7_9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966018" comment="bind-export-devel-9.11.4-26.P2.el7_9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966019" comment="bind-export-libs-9.11.4-26.P2.el7_9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966020" comment="bind-libs-9.11.4-26.P2.el7_9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966021" comment="bind-libs-lite-9.11.4-26.P2.el7_9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966022" comment="bind-license-9.11.4-26.P2.el7_9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966023" comment="bind-lite-devel-9.11.4-26.P2.el7_9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966024" comment="bind-pkcs11-9.11.4-26.P2.el7_9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966025" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966026" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966027" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966028" comment="bind-sdb-9.11.4-26.P2.el7_9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966029" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009966030" comment="bind-utils-9.11.4-26.P2.el7_9.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1447" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18814.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18814.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024098" comment="java-1.8.0-openjdk-1.8.0.472.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024099" comment="java-1.8.0-openjdk-accessibility-1.8.0.472.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024100" comment="java-1.8.0-openjdk-demo-1.8.0.472.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024101" comment="java-1.8.0-openjdk-devel-1.8.0.472.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024102" comment="java-1.8.0-openjdk-headless-1.8.0.472.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024103" comment="java-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024104" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010024105" comment="java-1.8.0-openjdk-src-1.8.0.472.b08-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1448" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057/" source="CVE"/>
		<reference ref_id="CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:18818.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:18818.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010025669" comment="java-11-openjdk-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025494" comment="java-11-openjdk-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025670" comment="java-11-openjdk-demo-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025496" comment="java-11-openjdk-demo-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025497" comment="java-11-openjdk-demo-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025498" comment="java-11-openjdk-demo-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025671" comment="java-11-openjdk-devel-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025500" comment="java-11-openjdk-devel-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025501" comment="java-11-openjdk-devel-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025502" comment="java-11-openjdk-devel-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025503" comment="java-11-openjdk-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025672" comment="java-11-openjdk-headless-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025505" comment="java-11-openjdk-headless-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025506" comment="java-11-openjdk-headless-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025507" comment="java-11-openjdk-headless-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025673" comment="java-11-openjdk-javadoc-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025509" comment="java-11-openjdk-javadoc-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025674" comment="java-11-openjdk-javadoc-zip-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025511" comment="java-11-openjdk-javadoc-zip-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025675" comment="java-11-openjdk-jmods-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025513" comment="java-11-openjdk-jmods-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025514" comment="java-11-openjdk-jmods-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025515" comment="java-11-openjdk-jmods-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025516" comment="java-11-openjdk-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025676" comment="java-11-openjdk-src-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025518" comment="java-11-openjdk-src-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025519" comment="java-11-openjdk-src-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025520" comment="java-11-openjdk-src-slowdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025677" comment="java-11-openjdk-static-libs-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025522" comment="java-11-openjdk-static-libs-debug-11.0.29.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025523" comment="java-11-openjdk-static-libs-fastdebug-11.0.29.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010025524" comment="java-11-openjdk-static-libs-slowdebug-11.0.29.0.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1449" version="1" class="patch">
	<metadata>
		<title>security update for sssd (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-11561" ref_url="https://www.suse.com/security/cve/CVE-2025-11561/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:19847.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:19847.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11561/">CVE-2025-11561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11561">CVE-2025-11561 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010047003" comment="libipa_hbac-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047004" comment="libipa_hbac-devel-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047005" comment="libsss_autofs-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047006" comment="libsss_certmap-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047007" comment="libsss_certmap-devel-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047008" comment="libsss_idmap-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047009" comment="libsss_idmap-devel-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047010" comment="libsss_nss_idmap-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047011" comment="libsss_nss_idmap-devel-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047012" comment="libsss_simpleifp-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047013" comment="libsss_simpleifp-devel-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047014" comment="libsss_sudo-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047015" comment="python-libipa_hbac-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047016" comment="python-libsss_nss_idmap-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047017" comment="python-sss-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047018" comment="python-sss-murmur-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047019" comment="python-sssdconfig-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047020" comment="sssd-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047021" comment="sssd-ad-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047022" comment="sssd-client-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047023" comment="sssd-common-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047024" comment="sssd-common-pac-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047025" comment="sssd-dbus-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047026" comment="sssd-ipa-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047027" comment="sssd-kcm-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047028" comment="sssd-krb5-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047029" comment="sssd-krb5-common-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047030" comment="sssd-ldap-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047031" comment="sssd-libwbclient-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047032" comment="sssd-libwbclient-devel-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047033" comment="sssd-polkit-rules-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047034" comment="sssd-proxy-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047035" comment="sssd-tools-1.16.5-10.el7_9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010047036" comment="sssd-winbind-idmap-1.16.5-10.el7_9.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1450" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-48978" ref_url="https://www.suse.com/security/cve/CVE-2022-48978/" source="CVE"/>
		<reference ref_id="CVE-2023-53373" ref_url="https://www.suse.com/security/cve/CVE-2023-53373/" source="CVE"/>
		<reference ref_id="CVE-2025-22026" ref_url="https://www.suse.com/security/cve/CVE-2025-22026/" source="CVE"/>
		<reference ref_id="CVE-2025-37797" ref_url="https://www.suse.com/security/cve/CVE-2025-37797/" source="CVE"/>
		<reference ref_id="CVE-2025-38556" ref_url="https://www.suse.com/security/cve/CVE-2025-38556/" source="CVE"/>
		<reference ref_id="CVE-2025-39751" ref_url="https://www.suse.com/security/cve/CVE-2025-39751/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:21063.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:21063.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48978/">CVE-2022-48978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48978">CVE-2022-48978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53373/">CVE-2023-53373 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53373">CVE-2023-53373 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22026/">CVE-2025-22026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22026">CVE-2025-22026 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37797/">CVE-2025-37797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37797">CVE-2025-37797 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38556/">CVE-2025-38556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38556">CVE-2025-38556 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39751/">CVE-2025-39751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010032439" comment="bpftool-3.10.0-1160.142.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032440" comment="kernel-3.10.0-1160.142.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032441" comment="kernel-abi-whitelists-3.10.0-1160.142.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032442" comment="kernel-debug-3.10.0-1160.142.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032445" comment="kernel-doc-3.10.0-1160.142.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032446" comment="kernel-headers-3.10.0-1160.142.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032447" comment="kernel-tools-3.10.0-1160.142.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032448" comment="kernel-tools-libs-3.10.0-1160.142.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032450" comment="perf-3.10.0-1160.142.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010032451" comment="python-perf-3.10.0-1160.142.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1451" version="1" class="patch">
	<metadata>
		<title>security update for emacs (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-1244" ref_url="https://www.suse.com/security/cve/CVE-2025-1244/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2130.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2130.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1244/">CVE-2025-1244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1244">CVE-2025-1244 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968226" comment="emacs-24.3-23.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968227" comment="emacs-common-24.3-23.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968228" comment="emacs-el-24.3-23.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968229" comment="emacs-filesystem-24.3-23.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968230" comment="emacs-nox-24.3-23.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968231" comment="emacs-terminal-24.3-23.el7_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1452" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229/" source="CVE"/>
		<reference ref_id="CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230/" source="CVE"/>
		<reference ref_id="CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22096.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22096.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010031899" comment="tigervnc-1.8.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031900" comment="tigervnc-icons-1.8.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031901" comment="tigervnc-license-1.8.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031902" comment="tigervnc-server-1.8.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031903" comment="tigervnc-server-applet-1.8.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031904" comment="tigervnc-server-minimal-1.8.0-36.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010031905" comment="tigervnc-server-module-1.8.0-36.el7_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1453" version="1" class="patch">
	<metadata>
		<title>security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-40778" ref_url="https://www.suse.com/security/cve/CVE-2025-40778/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22205.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22205.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40778/">CVE-2025-40778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40778">CVE-2025-40778 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010033792" comment="bind-9.11.4-26.P2.el7_9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033793" comment="bind-chroot-9.11.4-26.P2.el7_9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033794" comment="bind-devel-9.11.4-26.P2.el7_9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033795" comment="bind-export-devel-9.11.4-26.P2.el7_9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033796" comment="bind-export-libs-9.11.4-26.P2.el7_9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033797" comment="bind-libs-9.11.4-26.P2.el7_9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033798" comment="bind-libs-lite-9.11.4-26.P2.el7_9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033799" comment="bind-license-9.11.4-26.P2.el7_9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033800" comment="bind-lite-devel-9.11.4-26.P2.el7_9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033801" comment="bind-pkcs11-9.11.4-26.P2.el7_9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033802" comment="bind-pkcs11-devel-9.11.4-26.P2.el7_9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033803" comment="bind-pkcs11-libs-9.11.4-26.P2.el7_9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033804" comment="bind-pkcs11-utils-9.11.4-26.P2.el7_9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033805" comment="bind-sdb-9.11.4-26.P2.el7_9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033806" comment="bind-sdb-chroot-9.11.4-26.P2.el7_9.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010033807" comment="bind-utils-9.11.4-26.P2.el7_9.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1454" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640/" source="CVE"/>
		<reference ref_id="CVE-2022-50341" ref_url="https://www.suse.com/security/cve/CVE-2022-50341/" source="CVE"/>
		<reference ref_id="CVE-2022-50386" ref_url="https://www.suse.com/security/cve/CVE-2022-50386/" source="CVE"/>
		<reference ref_id="CVE-2022-50408" ref_url="https://www.suse.com/security/cve/CVE-2022-50408/" source="CVE"/>
		<reference ref_id="CVE-2023-53305" ref_url="https://www.suse.com/security/cve/CVE-2023-53305/" source="CVE"/>
		<reference ref_id="CVE-2023-53365" ref_url="https://www.suse.com/security/cve/CVE-2023-53365/" source="CVE"/>
		<reference ref_id="CVE-2025-38718" ref_url="https://www.suse.com/security/cve/CVE-2025-38718/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:22910.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:22910.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3640">CVE-2022-3640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50341/">CVE-2022-50341 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50341">CVE-2022-50341 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50386/">CVE-2022-50386 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50386">CVE-2022-50386 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50408/">CVE-2022-50408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50408">CVE-2022-50408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53305/">CVE-2023-53305 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53305">CVE-2023-53305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53365/">CVE-2023-53365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53365">CVE-2023-53365 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38718/">CVE-2025-38718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38718">CVE-2025-38718 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037040" comment="bpftool-3.10.0-1160.143.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037041" comment="kernel-3.10.0-1160.143.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037042" comment="kernel-abi-whitelists-3.10.0-1160.143.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037043" comment="kernel-debug-3.10.0-1160.143.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037046" comment="kernel-doc-3.10.0-1160.143.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037047" comment="kernel-headers-3.10.0-1160.143.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037048" comment="kernel-tools-3.10.0-1160.143.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037049" comment="kernel-tools-libs-3.10.0-1160.143.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037051" comment="perf-3.10.0-1160.143.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037052" comment="python-perf-3.10.0-1160.143.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1455" version="1" class="patch">
	<metadata>
		<title>security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-12087" ref_url="https://www.suse.com/security/cve/CVE-2024-12087/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23415.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23415.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12087/">CVE-2024-12087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12087">CVE-2024-12087 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010034202" comment="rsync-3.1.2-12.el7_9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1456" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-50356" ref_url="https://www.suse.com/security/cve/CVE-2022-50356/" source="CVE"/>
		<reference ref_id="CVE-2022-50367" ref_url="https://www.suse.com/security/cve/CVE-2022-50367/" source="CVE"/>
		<reference ref_id="CVE-2022-50403" ref_url="https://www.suse.com/security/cve/CVE-2022-50403/" source="CVE"/>
		<reference ref_id="CVE-2022-50406" ref_url="https://www.suse.com/security/cve/CVE-2022-50406/" source="CVE"/>
		<reference ref_id="CVE-2022-50410" ref_url="https://www.suse.com/security/cve/CVE-2022-50410/" source="CVE"/>
		<reference ref_id="CVE-2023-53178" ref_url="https://www.suse.com/security/cve/CVE-2023-53178/" source="CVE"/>
		<reference ref_id="CVE-2023-53297" ref_url="https://www.suse.com/security/cve/CVE-2023-53297/" source="CVE"/>
		<reference ref_id="CVE-2023-53322" ref_url="https://www.suse.com/security/cve/CVE-2023-53322/" source="CVE"/>
		<reference ref_id="CVE-2025-38729" ref_url="https://www.suse.com/security/cve/CVE-2025-38729/" source="CVE"/>
		<reference ref_id="CVE-2025-39757" ref_url="https://www.suse.com/security/cve/CVE-2025-39757/" source="CVE"/>
		<reference ref_id="CVE-2025-39955" ref_url="https://www.suse.com/security/cve/CVE-2025-39955/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:23947.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:23947.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50356/">CVE-2022-50356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50356">CVE-2022-50356 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50367/">CVE-2022-50367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50367">CVE-2022-50367 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50403/">CVE-2022-50403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50403">CVE-2022-50403 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50406/">CVE-2022-50406 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50406">CVE-2022-50406 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50410/">CVE-2022-50410 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50410">CVE-2022-50410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53178/">CVE-2023-53178 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53178">CVE-2023-53178 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53297/">CVE-2023-53297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53297">CVE-2023-53297 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53322/">CVE-2023-53322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53322">CVE-2023-53322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38729/">CVE-2025-38729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38729">CVE-2025-38729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39757/">CVE-2025-39757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39757">CVE-2025-39757 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39955/">CVE-2025-39955 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39955">CVE-2025-39955 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037313" comment="bpftool-3.10.0-1160.144.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037314" comment="kernel-3.10.0-1160.144.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037315" comment="kernel-abi-whitelists-3.10.0-1160.144.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037316" comment="kernel-debug-3.10.0-1160.144.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037319" comment="kernel-doc-3.10.0-1160.144.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037320" comment="kernel-headers-3.10.0-1160.144.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037321" comment="kernel-tools-3.10.0-1160.144.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037322" comment="kernel-tools-libs-3.10.0-1160.144.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037324" comment="perf-3.10.0-1160.144.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037325" comment="python-perf-3.10.0-1160.144.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1457" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-52922" ref_url="https://www.suse.com/security/cve/CVE-2023-52922/" source="CVE"/>
		<reference ref_id="CVE-2024-50302" ref_url="https://www.suse.com/security/cve/CVE-2024-50302/" source="CVE"/>
		<reference ref_id="CVE-2024-53197" ref_url="https://www.suse.com/security/cve/CVE-2024-53197/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2501.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2501.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52922/">CVE-2023-52922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52922">CVE-2023-52922 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50302/">CVE-2024-50302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53197/">CVE-2024-53197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53197">CVE-2024-53197 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969081" comment="bpftool-3.10.0-1160.133.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969082" comment="kernel-3.10.0-1160.133.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969083" comment="kernel-abi-whitelists-3.10.0-1160.133.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969084" comment="kernel-debug-3.10.0-1160.133.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969087" comment="kernel-doc-3.10.0-1160.133.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969088" comment="kernel-headers-3.10.0-1160.133.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969089" comment="kernel-tools-3.10.0-1160.133.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969090" comment="kernel-tools-libs-3.10.0-1160.133.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969092" comment="perf-3.10.0-1160.133.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969093" comment="python-perf-3.10.0-1160.133.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1458" version="1" class="patch">
	<metadata>
		<title>security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-56171" ref_url="https://www.suse.com/security/cve/CVE-2024-56171/" source="CVE"/>
		<reference ref_id="CVE-2025-24928" ref_url="https://www.suse.com/security/cve/CVE-2025-24928/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2673.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2673.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56171/">CVE-2024-56171 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56171">CVE-2024-56171 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24928/">CVE-2025-24928 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24928">CVE-2025-24928 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009969739" comment="libxml2-2.9.1-6.el7_9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969740" comment="libxml2-devel-2.9.1-6.el7_9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969741" comment="libxml2-python-2.9.1-6.el7_9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009969742" comment="libxml2-static-2.9.1-6.el7_9.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1459" version="1" class="patch">
	<metadata>
		<title>security update for tigervnc (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-26594" ref_url="https://www.suse.com/security/cve/CVE-2025-26594/" source="CVE"/>
		<reference ref_id="CVE-2025-26595" ref_url="https://www.suse.com/security/cve/CVE-2025-26595/" source="CVE"/>
		<reference ref_id="CVE-2025-26596" ref_url="https://www.suse.com/security/cve/CVE-2025-26596/" source="CVE"/>
		<reference ref_id="CVE-2025-26597" ref_url="https://www.suse.com/security/cve/CVE-2025-26597/" source="CVE"/>
		<reference ref_id="CVE-2025-26598" ref_url="https://www.suse.com/security/cve/CVE-2025-26598/" source="CVE"/>
		<reference ref_id="CVE-2025-26599" ref_url="https://www.suse.com/security/cve/CVE-2025-26599/" source="CVE"/>
		<reference ref_id="CVE-2025-26600" ref_url="https://www.suse.com/security/cve/CVE-2025-26600/" source="CVE"/>
		<reference ref_id="CVE-2025-26601" ref_url="https://www.suse.com/security/cve/CVE-2025-26601/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2861.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2861.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-26594/">CVE-2025-26594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26594">CVE-2025-26594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26595/">CVE-2025-26595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26595">CVE-2025-26595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26596/">CVE-2025-26596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26596">CVE-2025-26596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26597/">CVE-2025-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26597">CVE-2025-26597 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26598/">CVE-2025-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26598">CVE-2025-26598 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26599/">CVE-2025-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26599">CVE-2025-26599 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26600/">CVE-2025-26600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26600">CVE-2025-26600 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26601/">CVE-2025-26601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26601">CVE-2025-26601 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968232" comment="tigervnc-1.8.0-36.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968233" comment="tigervnc-icons-1.8.0-36.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968234" comment="tigervnc-license-1.8.0-36.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968235" comment="tigervnc-server-1.8.0-36.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968236" comment="tigervnc-server-applet-1.8.0-36.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968237" comment="tigervnc-server-minimal-1.8.0-36.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968238" comment="tigervnc-server-module-1.8.0-36.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1460" version="1" class="patch">
	<metadata>
		<title>security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-26594" ref_url="https://www.suse.com/security/cve/CVE-2025-26594/" source="CVE"/>
		<reference ref_id="CVE-2025-26595" ref_url="https://www.suse.com/security/cve/CVE-2025-26595/" source="CVE"/>
		<reference ref_id="CVE-2025-26596" ref_url="https://www.suse.com/security/cve/CVE-2025-26596/" source="CVE"/>
		<reference ref_id="CVE-2025-26597" ref_url="https://www.suse.com/security/cve/CVE-2025-26597/" source="CVE"/>
		<reference ref_id="CVE-2025-26598" ref_url="https://www.suse.com/security/cve/CVE-2025-26598/" source="CVE"/>
		<reference ref_id="CVE-2025-26599" ref_url="https://www.suse.com/security/cve/CVE-2025-26599/" source="CVE"/>
		<reference ref_id="CVE-2025-26600" ref_url="https://www.suse.com/security/cve/CVE-2025-26600/" source="CVE"/>
		<reference ref_id="CVE-2025-26601" ref_url="https://www.suse.com/security/cve/CVE-2025-26601/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:2879.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:2879.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-26594/">CVE-2025-26594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26594">CVE-2025-26594 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26595/">CVE-2025-26595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26595">CVE-2025-26595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26596/">CVE-2025-26596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26596">CVE-2025-26596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26597/">CVE-2025-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26597">CVE-2025-26597 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26598/">CVE-2025-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26598">CVE-2025-26598 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26599/">CVE-2025-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26599">CVE-2025-26599 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26600/">CVE-2025-26600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26600">CVE-2025-26600 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26601/">CVE-2025-26601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26601">CVE-2025-26601 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009968239" comment="xorg-x11-server-Xdmx-1.20.4-30.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968240" comment="xorg-x11-server-Xephyr-1.20.4-30.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968241" comment="xorg-x11-server-Xnest-1.20.4-30.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968242" comment="xorg-x11-server-Xorg-1.20.4-30.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968243" comment="xorg-x11-server-Xvfb-1.20.4-30.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968244" comment="xorg-x11-server-Xwayland-1.20.4-30.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968245" comment="xorg-x11-server-common-1.20.4-30.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968246" comment="xorg-x11-server-devel-1.20.4-30.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009968247" comment="xorg-x11-server-source-1.20.4-30.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1461" version="1" class="patch">
	<metadata>
		<title>security update for libxslt (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-55549" ref_url="https://www.suse.com/security/cve/CVE-2024-55549/" source="CVE"/>
		<reference ref_id="CVE-2025-24855" ref_url="https://www.suse.com/security/cve/CVE-2025-24855/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3612.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3612.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-55549/">CVE-2024-55549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55549">CVE-2024-55549 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-24855/">CVE-2025-24855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24855">CVE-2025-24855 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009974858" comment="libxslt-1.1.28-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974859" comment="libxslt-devel-1.1.28-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009974860" comment="libxslt-python-1.1.28-8.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1462" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3844.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3844.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009977524" comment="java-1.8.0-openjdk-1.8.0.452.b09-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977525" comment="java-1.8.0-openjdk-accessibility-1.8.0.452.b09-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977526" comment="java-1.8.0-openjdk-demo-1.8.0.452.b09-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977527" comment="java-1.8.0-openjdk-devel-1.8.0.452.b09-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977528" comment="java-1.8.0-openjdk-headless-1.8.0.452.b09-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977529" comment="java-1.8.0-openjdk-javadoc-1.8.0.452.b09-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977530" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009977531" comment="java-1.8.0-openjdk-src-1.8.0.452.b09-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1463" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587/" source="CVE"/>
		<reference ref_id="CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691/" source="CVE"/>
		<reference ref_id="CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3848.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3848.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009999610" comment="java-11-openjdk-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999549" comment="java-11-openjdk-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999611" comment="java-11-openjdk-demo-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999551" comment="java-11-openjdk-demo-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999552" comment="java-11-openjdk-demo-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999553" comment="java-11-openjdk-demo-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999612" comment="java-11-openjdk-devel-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999555" comment="java-11-openjdk-devel-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999556" comment="java-11-openjdk-devel-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999557" comment="java-11-openjdk-devel-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999558" comment="java-11-openjdk-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999613" comment="java-11-openjdk-headless-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999560" comment="java-11-openjdk-headless-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999561" comment="java-11-openjdk-headless-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999562" comment="java-11-openjdk-headless-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999614" comment="java-11-openjdk-javadoc-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999564" comment="java-11-openjdk-javadoc-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999615" comment="java-11-openjdk-javadoc-zip-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999566" comment="java-11-openjdk-javadoc-zip-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999616" comment="java-11-openjdk-jmods-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999568" comment="java-11-openjdk-jmods-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999569" comment="java-11-openjdk-jmods-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999570" comment="java-11-openjdk-jmods-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999571" comment="java-11-openjdk-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999617" comment="java-11-openjdk-src-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999573" comment="java-11-openjdk-src-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999574" comment="java-11-openjdk-src-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999575" comment="java-11-openjdk-src-slowdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999618" comment="java-11-openjdk-static-libs-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999577" comment="java-11-openjdk-static-libs-debug-11.0.27.0.6-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999578" comment="java-11-openjdk-static-libs-fastdebug-11.0.27.0.6-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009999579" comment="java-11-openjdk-static-libs-slowdebug-11.0.27.0.6-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1464" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-53150" ref_url="https://www.suse.com/security/cve/CVE-2024-53150/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3880.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3880.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53150/">CVE-2024-53150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53150">CVE-2024-53150 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009976240" comment="bpftool-3.10.0-1160.134.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976241" comment="kernel-3.10.0-1160.134.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976242" comment="kernel-abi-whitelists-3.10.0-1160.134.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976243" comment="kernel-debug-3.10.0-1160.134.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976246" comment="kernel-doc-3.10.0-1160.134.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976247" comment="kernel-headers-3.10.0-1160.134.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976248" comment="kernel-tools-3.10.0-1160.134.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976249" comment="kernel-tools-libs-3.10.0-1160.134.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976251" comment="perf-3.10.0-1160.134.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009976252" comment="python-perf-3.10.0-1160.134.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1465" version="1" class="patch">
	<metadata>
		<title>security update for postgresql (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:3978.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:3978.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009986602" comment="postgresql-9.2.24-9.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986603" comment="postgresql-contrib-9.2.24-9.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986604" comment="postgresql-devel-9.2.24-9.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986605" comment="postgresql-docs-9.2.24-9.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986606" comment="postgresql-libs-9.2.24-9.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986607" comment="postgresql-plperl-9.2.24-9.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986608" comment="postgresql-plpython-9.2.24-9.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986609" comment="postgresql-pltcl-9.2.24-9.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986610" comment="postgresql-server-9.2.24-9.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986611" comment="postgresql-static-9.2.24-9.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986612" comment="postgresql-test-9.2.24-9.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986613" comment="postgresql-upgrade-9.2.24-9.el7_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1466" version="1" class="patch">
	<metadata>
		<title>security update for virtuoso-opensource (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-57656" ref_url="https://www.suse.com/security/cve/CVE-2024-57656/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:4039.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:4039.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-57656/">CVE-2024-57656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57656">CVE-2024-57656 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985775" comment="virtuoso-opensource-6.1.6-8.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985776" comment="virtuoso-opensource-utils-6.1.6-8.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1467" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2024-53141" ref_url="https://www.suse.com/security/cve/CVE-2024-53141/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:7898.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:7898.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53141/">CVE-2024-53141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53141">CVE-2024-53141 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009983821" comment="bpftool-3.10.0-1160.135.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983822" comment="kernel-3.10.0-1160.135.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983823" comment="kernel-abi-whitelists-3.10.0-1160.135.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983824" comment="kernel-debug-3.10.0-1160.135.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983827" comment="kernel-doc-3.10.0-1160.135.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983828" comment="kernel-headers-3.10.0-1160.135.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983829" comment="kernel-tools-3.10.0-1160.135.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983830" comment="kernel-tools-libs-3.10.0-1160.135.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983832" comment="perf-3.10.0-1160.135.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009983833" comment="python-perf-3.10.0-1160.135.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1468" version="1" class="patch">
	<metadata>
		<title>security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8314.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8314.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9840">CVE-2016-9840 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009985929" comment="minizip-1.2.7-21.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985930" comment="minizip-devel-1.2.7-21.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985931" comment="zlib-1.2.7-21.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985932" comment="zlib-devel-1.2.7-21.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009985933" comment="zlib-static-1.2.7-21.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1469" version="1" class="patch">
	<metadata>
		<title>security update for perl-FCGI (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-40907" ref_url="https://www.suse.com/security/cve/CVE-2025-40907/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:8625.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:8625.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-40907/">CVE-2025-40907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40907">CVE-2025-40907 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009986261" comment="perl-FCGI-0.74-8.el7_9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1470" version="1" class="patch">
	<metadata>
		<title>security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-2784" ref_url="https://www.suse.com/security/cve/CVE-2025-2784/" source="CVE"/>
		<reference ref_id="CVE-2025-32049" ref_url="https://www.suse.com/security/cve/CVE-2025-32049/" source="CVE"/>
		<reference ref_id="CVE-2025-32906" ref_url="https://www.suse.com/security/cve/CVE-2025-32906/" source="CVE"/>
		<reference ref_id="CVE-2025-32911" ref_url="https://www.suse.com/security/cve/CVE-2025-32911/" source="CVE"/>
		<reference ref_id="CVE-2025-32913" ref_url="https://www.suse.com/security/cve/CVE-2025-32913/" source="CVE"/>
		<reference ref_id="CVE-2025-32914" ref_url="https://www.suse.com/security/cve/CVE-2025-32914/" source="CVE"/>
		<reference ref_id="CVE-2025-4948" ref_url="https://www.suse.com/security/cve/CVE-2025-4948/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9179.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9179.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2784/">CVE-2025-2784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2784">CVE-2025-2784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32049/">CVE-2025-32049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32049">CVE-2025-32049 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32906/">CVE-2025-32906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32906">CVE-2025-32906 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-32911/">CVE-2025-32911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32911">CVE-2025-32911 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32913/">CVE-2025-32913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32913">CVE-2025-32913 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-32914/">CVE-2025-32914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32914">CVE-2025-32914 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4948/">CVE-2025-4948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4948">CVE-2025-4948 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998908" comment="libsoup-2.62.2-6.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998909" comment="libsoup-devel-2.62.2-6.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1471" version="1" class="patch">
	<metadata>
		<title>security update for libvpx (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-5283" ref_url="https://www.suse.com/security/cve/CVE-2025-5283/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9331.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9331.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5283/">CVE-2025-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5283">CVE-2025-5283 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010009451" comment="libvpx-1.3.0-8.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009452" comment="libvpx-devel-1.3.0-8.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010009453" comment="libvpx-utils-1.3.0-8.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1472" version="1" class="patch">
	<metadata>
		<title>security update for mpfr (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9332.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9332.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9474">CVE-2014-9474 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009998140" comment="mpfr-3.1.1-4.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998141" comment="mpfr-devel-3.1.1-4.el7_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1473" version="1" class="patch">
	<metadata>
		<title>security update for gimp (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-48797" ref_url="https://www.suse.com/security/cve/CVE-2025-48797/" source="CVE"/>
		<reference ref_id="CVE-2025-48798" ref_url="https://www.suse.com/security/cve/CVE-2025-48798/" source="CVE"/>
		<reference ref_id="CVE-2025-5473" ref_url="https://www.suse.com/security/cve/CVE-2025-5473/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9501.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9501.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-48797/">CVE-2025-48797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48797">CVE-2025-48797 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-48798/">CVE-2025-48798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48798">CVE-2025-48798 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5473/">CVE-2025-5473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5473">CVE-2025-5473 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010014503" comment="gimp-2.8.22-1.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014504" comment="gimp-devel-2.8.22-1.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014505" comment="gimp-devel-tools-2.8.22-1.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010014506" comment="gimp-libs-2.8.22-1.el7_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1474" version="1" class="patch">
	<metadata>
		<title>security update for perl-File-Find-Rule-Perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2011-10007" ref_url="https://www.suse.com/security/cve/CVE-2011-10007/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9740.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9740.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2011-10007/">CVE-2011-10007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-10007">CVE-2011-10007 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998142" comment="perl-File-Find-Rule-Perl-1.13-2.el7_9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1475" version="1" class="patch">
	<metadata>
		<title>security update for perl-File-Find-Rule (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2011-10007" ref_url="https://www.suse.com/security/cve/CVE-2011-10007/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2025:9741.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2025:9741.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2011-10007/">CVE-2011-10007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-10007">CVE-2011-10007 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009998143" comment="perl-File-Find-Rule-0.33-5.el7_9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1476" version="1" class="patch">
	<metadata>
		<title>security update for perl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-31484" ref_url="https://www.suse.com/security/cve/CVE-2023-31484/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0079.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0079.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31484/">CVE-2023-31484 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31484">CVE-2023-31484 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010037326" comment="perl-5.16.3-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037327" comment="perl-CPAN-1.9800-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037328" comment="perl-ExtUtils-CBuilder-0.28.2.6-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037329" comment="perl-ExtUtils-Embed-1.30-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037330" comment="perl-ExtUtils-Install-1.58-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037331" comment="perl-IO-Zlib-1.10-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037332" comment="perl-Locale-Maketext-Simple-0.21-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037333" comment="perl-Module-CoreList-2.76.02-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037334" comment="perl-Module-Loaded-0.08-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037335" comment="perl-Object-Accessor-0.42-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037336" comment="perl-Package-Constants-0.02-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037337" comment="perl-Pod-Escapes-1.04-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037338" comment="perl-Time-Piece-1.20.1-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037339" comment="perl-core-5.16.3-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037340" comment="perl-devel-5.16.3-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037341" comment="perl-libs-5.16.3-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037342" comment="perl-macros-5.16.3-299.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010037343" comment="perl-tests-5.16.3-299.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1477" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2023-53675" ref_url="https://www.suse.com/security/cve/CVE-2023-53675/" source="CVE"/>
		<reference ref_id="CVE-2023-53705" ref_url="https://www.suse.com/security/cve/CVE-2023-53705/" source="CVE"/>
		<reference ref_id="CVE-2025-37823" ref_url="https://www.suse.com/security/cve/CVE-2025-37823/" source="CVE"/>
		<reference ref_id="CVE-2025-68285" ref_url="https://www.suse.com/security/cve/CVE-2025-68285/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0755.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0755.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53675/">CVE-2023-53675 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53675">CVE-2023-53675 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53705/">CVE-2023-53705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53705">CVE-2023-53705 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37823/">CVE-2025-37823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37823">CVE-2025-37823 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68285/">CVE-2025-68285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68285">CVE-2025-68285 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010039005" comment="bpftool-3.10.0-1160.145.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039006" comment="kernel-3.10.0-1160.145.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039007" comment="kernel-abi-whitelists-3.10.0-1160.145.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039008" comment="kernel-debug-3.10.0-1160.145.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039011" comment="kernel-doc-3.10.0-1160.145.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039012" comment="kernel-headers-3.10.0-1160.145.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039013" comment="kernel-tools-3.10.0-1160.145.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039014" comment="kernel-tools-libs-3.10.0-1160.145.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039016" comment="perf-3.10.0-1160.145.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010039017" comment="python-perf-3.10.0-1160.145.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1478" version="1" class="patch">
	<metadata>
		<title>security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720/" source="CVE"/>
		<reference ref_id="CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018/" source="CVE"/>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0847.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0847.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010053475" comment="java-11-openjdk-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043334" comment="java-11-openjdk-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053476" comment="java-11-openjdk-demo-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043336" comment="java-11-openjdk-demo-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053477" comment="java-11-openjdk-demo-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053478" comment="java-11-openjdk-demo-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053479" comment="java-11-openjdk-devel-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043340" comment="java-11-openjdk-devel-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053480" comment="java-11-openjdk-devel-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053481" comment="java-11-openjdk-devel-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053482" comment="java-11-openjdk-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053483" comment="java-11-openjdk-headless-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043345" comment="java-11-openjdk-headless-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053484" comment="java-11-openjdk-headless-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053485" comment="java-11-openjdk-headless-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053486" comment="java-11-openjdk-javadoc-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043349" comment="java-11-openjdk-javadoc-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053487" comment="java-11-openjdk-javadoc-zip-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043351" comment="java-11-openjdk-javadoc-zip-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053488" comment="java-11-openjdk-jmods-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043353" comment="java-11-openjdk-jmods-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053489" comment="java-11-openjdk-jmods-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053490" comment="java-11-openjdk-jmods-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053491" comment="java-11-openjdk-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053492" comment="java-11-openjdk-src-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043358" comment="java-11-openjdk-src-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053493" comment="java-11-openjdk-src-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053494" comment="java-11-openjdk-src-slowdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053495" comment="java-11-openjdk-static-libs-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010043362" comment="java-11-openjdk-static-libs-debug-11.0.30.0.7-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053496" comment="java-11-openjdk-static-libs-fastdebug-11.0.30.0.7-1.el9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010053497" comment="java-11-openjdk-static-libs-slowdebug-11.0.30.0.7-1.el9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1479" version="1" class="patch">
	<metadata>
		<title>security update for java-1.8.0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925/" source="CVE"/>
		<reference ref_id="CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933/" source="CVE"/>
		<reference ref_id="CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:0931.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:0931.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041186" comment="java-1.8.0-openjdk-1.8.0.482.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041187" comment="java-1.8.0-openjdk-accessibility-1.8.0.482.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041188" comment="java-1.8.0-openjdk-demo-1.8.0.482.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041189" comment="java-1.8.0-openjdk-devel-1.8.0.482.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041190" comment="java-1.8.0-openjdk-headless-1.8.0.482.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041191" comment="java-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041193" comment="java-1.8.0-openjdk-src-1.8.0.482.b08-1.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1480" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-39898" ref_url="https://www.suse.com/security/cve/CVE-2025-39898/" source="CVE"/>
		<reference ref_id="CVE-2025-39971" ref_url="https://www.suse.com/security/cve/CVE-2025-39971/" source="CVE"/>
		<reference ref_id="CVE-2025-40248" ref_url="https://www.suse.com/security/cve/CVE-2025-40248/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1581.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1581.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39898/">CVE-2025-39898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39898">CVE-2025-39898 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39971/">CVE-2025-39971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39971">CVE-2025-39971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40248/">CVE-2025-40248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40248">CVE-2025-40248 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010042403" comment="bpftool-3.10.0-1160.146.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042404" comment="kernel-3.10.0-1160.146.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042405" comment="kernel-abi-whitelists-3.10.0-1160.146.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042406" comment="kernel-debug-3.10.0-1160.146.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042409" comment="kernel-doc-3.10.0-1160.146.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042410" comment="kernel-headers-3.10.0-1160.146.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042411" comment="kernel-tools-3.10.0-1160.146.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042412" comment="kernel-tools-libs-3.10.0-1160.146.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042414" comment="perf-3.10.0-1160.146.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010042415" comment="python-perf-3.10.0-1160.146.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1481" version="1" class="patch">
	<metadata>
		<title>security update for glib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-13601" ref_url="https://www.suse.com/security/cve/CVE-2025-13601/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1608.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1608.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13601/">CVE-2025-13601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13601">CVE-2025-13601 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041693" comment="glib2-2.56.1-11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041694" comment="glib2-devel-2.56.1-11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041695" comment="glib2-doc-2.56.1-11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041696" comment="glib2-fam-2.56.1-11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041697" comment="glib2-static-2.56.1-11.el7_9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041698" comment="glib2-tests-2.56.1-11.el7_9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1482" version="1" class="patch">
	<metadata>
		<title>security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-9230" ref_url="https://www.suse.com/security/cve/CVE-2025-9230/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:1720.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:1720.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9230/">CVE-2025-9230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010041699" comment="openssl-1.0.2k-26.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041700" comment="openssl-devel-1.0.2k-26.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041701" comment="openssl-libs-1.0.2k-26.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041702" comment="openssl-perl-1.0.2k-26.el7_9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010041703" comment="openssl-static-1.0.2k-26.el7_9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1483" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:2713.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:2713.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010045089" comment="python3-3.6.8-21.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045090" comment="python3-debug-3.6.8-21.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045091" comment="python3-devel-3.6.8-21.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045092" comment="python3-idle-3.6.8-21.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045093" comment="python3-libs-3.6.8-21.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045094" comment="python3-test-3.6.8-21.el7_9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010045095" comment="python3-tkinter-3.6.8-21.el7_9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1484" version="1" class="patch">
	<metadata>
		<title>security update for kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2022-50673" ref_url="https://www.suse.com/security/cve/CVE-2022-50673/" source="CVE"/>
		<reference ref_id="CVE-2025-38415" ref_url="https://www.suse.com/security/cve/CVE-2025-38415/" source="CVE"/>
		<reference ref_id="CVE-2025-38459" ref_url="https://www.suse.com/security/cve/CVE-2025-38459/" source="CVE"/>
		<reference ref_id="CVE-2025-39760" ref_url="https://www.suse.com/security/cve/CVE-2025-39760/" source="CVE"/>
		<reference ref_id="CVE-2025-39817" ref_url="https://www.suse.com/security/cve/CVE-2025-39817/" source="CVE"/>
		<reference ref_id="CVE-2025-39993" ref_url="https://www.suse.com/security/cve/CVE-2025-39993/" source="CVE"/>
		<reference ref_id="CVE-2025-40271" ref_url="https://www.suse.com/security/cve/CVE-2025-40271/" source="CVE"/>
		<reference ref_id="CVE-2025-68349" ref_url="https://www.suse.com/security/cve/CVE-2025-68349/" source="CVE"/>
		<reference ref_id="CVE-2026-23074" ref_url="https://www.suse.com/security/cve/CVE-2026-23074/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:3685.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:3685.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50673/">CVE-2022-50673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50673">CVE-2022-50673 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38415/">CVE-2025-38415 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38415">CVE-2025-38415 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38459/">CVE-2025-38459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38459">CVE-2025-38459 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39760/">CVE-2025-39760 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39760">CVE-2025-39760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39817/">CVE-2025-39817 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39817">CVE-2025-39817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39993/">CVE-2025-39993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39993">CVE-2025-39993 at NVD</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40271/">CVE-2025-40271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40271">CVE-2025-40271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68349/">CVE-2025-68349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68349">CVE-2025-68349 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23074/">CVE-2026-23074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23074">CVE-2026-23074 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050974" comment="bpftool-3.10.0-1160.147.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050975" comment="kernel-3.10.0-1160.147.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050976" comment="kernel-abi-whitelists-3.10.0-1160.147.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050977" comment="kernel-debug-3.10.0-1160.147.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050978" comment="kernel-doc-3.10.0-1160.147.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050979" comment="kernel-headers-3.10.0-1160.147.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050980" comment="kernel-tools-3.10.0-1160.147.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050981" comment="kernel-tools-libs-3.10.0-1160.147.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050982" comment="perf-3.10.0-1160.147.1.el7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050983" comment="python-perf-3.10.0-1160.147.1.el7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1485" version="1" class="patch">
	<metadata>
		<title>security update for python-pyasn1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2026-23490" ref_url="https://www.suse.com/security/cve/CVE-2026-23490/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:4148.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:4148.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23490/">CVE-2026-23490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23490">CVE-2026-23490 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010050068" comment="python2-pyasn1-0.1.9-7.el7_9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010050069" comment="python2-pyasn1-modules-0.1.9-7.el7_9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:1486" version="1" class="patch">
	<metadata>
		<title>security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Liberty Linux 7 LTSS</platform>
		</affected>
		<reference ref_id="CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366/" source="CVE"/>
		<reference ref_id="CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367/" source="CVE"/>
		<reference ref_id="CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299/" source="CVE"/>
		<description>
This security update provides a functional equivalent of RHSA-2026:6464.
The original Red Hat(R) advisory is available from the Red Hat web site at
https://access.redhat.com/errata/RHSA-2026:6464.
		</description>
<advisory from="security@suse.de">
	<issued date="1970-01-01"/>
	<updated date="1970-01-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009820086" comment="SUSE Liberty Linux 7 LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2010052848" comment="python3-3.6.8-21.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052849" comment="python3-debug-3.6.8-21.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052850" comment="python3-devel-3.6.8-21.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052851" comment="python3-idle-3.6.8-21.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052852" comment="python3-libs-3.6.8-21.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052853" comment="python3-test-3.6.8-21.el7_9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2010052854" comment="python3-tkinter-3.6.8-21.el7_9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881415" version="1" comment="httpd is &lt;2.4.6-99.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881416" version="1" comment="httpd-devel is &lt;2.4.6-99.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881417" version="1" comment="httpd-manual is &lt;2.4.6-99.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881418" version="1" comment="httpd-tools is &lt;2.4.6-99.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881419" version="1" comment="mod_ldap is &lt;2.4.6-99.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881420" version="1" comment="mod_proxy_html is &lt;2.4.6-99.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881421" version="1" comment="mod_session is &lt;2.4.6-99.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881422" version="1" comment="mod_ssl is &lt;2.4.6-99.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820086" version="1" comment="sles_es-release-server is &gt;=7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945509" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945510" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946141" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946142" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946143" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945514" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946144" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945516" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946145" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946146" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946147" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946148" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945521" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945522" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945523" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945524" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879076" version="1" comment="libndp is &lt;1.2-10.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879077" version="1" comment="libndp-devel is &lt;1.2-10.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820085" version="1" comment="unzip is &lt;6.0-14.el7.PTF.920871 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820087" version="1" comment="openssh is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820088" version="1" comment="openssh-askpass is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820089" version="1" comment="openssh-cavs is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820090" version="1" comment="openssh-clients is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820091" version="1" comment="openssh-keycat is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820092" version="1" comment="openssh-ldap is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820093" version="1" comment="openssh-server is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820094" version="1" comment="openssh-server-sysvinit is &lt;7.4p1-16.el7.PTF.1122802.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820095" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-2.16.el7.PTF.1122802.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820096" version="1" comment="fwupdate is &lt;12-5.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820097" version="1" comment="fwupdate-devel is &lt;12-5.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820098" version="1" comment="fwupdate-efi is &lt;12-5.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820099" version="1" comment="fwupdate-libs is &lt;12-5.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820100" version="1" comment="grub2 is &lt;2.02-0.85.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820101" version="1" comment="grub2-common is &lt;2.02-0.85.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820102" version="1" comment="grub2-efi-ia32 is &lt;2.02-0.85.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820103" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-0.85.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820104" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-0.85.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820105" version="1" comment="grub2-efi-x64 is &lt;2.02-0.85.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820106" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-0.85.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820107" version="1" comment="grub2-efi-x64-modules is &lt;2.02-0.85.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820108" version="1" comment="grub2-pc is &lt;2.02-0.85.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820109" version="1" comment="grub2-pc-modules is &lt;2.02-0.85.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820110" version="1" comment="grub2-tools is &lt;2.02-0.85.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820111" version="1" comment="grub2-tools-extra is &lt;2.02-0.85.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820112" version="1" comment="grub2-tools-minimal is &lt;2.02-0.85.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820113" version="1" comment="grub2 is &lt;2.02-0.86.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820114" version="1" comment="grub2-common is &lt;2.02-0.86.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820115" version="1" comment="grub2-efi-ia32 is &lt;2.02-0.86.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820116" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-0.86.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820117" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-0.86.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820118" version="1" comment="grub2-efi-x64 is &lt;2.02-0.86.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820119" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-0.86.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820120" version="1" comment="grub2-efi-x64-modules is &lt;2.02-0.86.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820121" version="1" comment="grub2-pc is &lt;2.02-0.86.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820122" version="1" comment="grub2-pc-modules is &lt;2.02-0.86.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820123" version="1" comment="grub2-tools is &lt;2.02-0.86.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820124" version="1" comment="grub2-tools-extra is &lt;2.02-0.86.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820125" version="1" comment="grub2-tools-minimal is &lt;2.02-0.86.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820126" version="1" comment="mokutil is &lt;15.4-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820127" version="1" comment="shim-ia32 is &lt;15.4-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820128" version="1" comment="shim-x64 is &lt;15.4-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820129" version="1" comment="fwupdate is &lt;12-6.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820130" version="1" comment="fwupdate-devel is &lt;12-6.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820131" version="1" comment="fwupdate-efi is &lt;12-6.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820132" version="1" comment="fwupdate-libs is &lt;12-6.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820133" version="1" comment="log4j is &lt;1.2.17-17.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820134" version="1" comment="log4j-javadoc is &lt;1.2.17-17.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820135" version="1" comment="log4j-manual is &lt;1.2.17-17.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820136" version="1" comment="log4j is &lt;1.2.17-18.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820137" version="1" comment="log4j-javadoc is &lt;1.2.17-18.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820138" version="1" comment="log4j-manual is &lt;1.2.17-18.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976232" version="1" comment="runc is &lt;1.0.0-70.rc10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976233" version="1" comment="docker is &lt;1.13.1-210.git7d71120.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976234" version="1" comment="docker-client is &lt;1.13.1-210.git7d71120.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976235" version="1" comment="docker-common is &lt;1.13.1-210.git7d71120.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976236" version="1" comment="docker-logrotate is &lt;1.13.1-210.git7d71120.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976237" version="1" comment="docker-lvm-plugin is &lt;1.13.1-210.git7d71120.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976238" version="1" comment="docker-novolume-plugin is &lt;1.13.1-210.git7d71120.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976239" version="1" comment="docker-v1.10-migrator is &lt;1.13.1-210.git7d71120.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943012" version="1" comment="bpftool is &lt;3.10.0-1160.123.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943013" version="1" comment="kernel is &lt;3.10.0-1160.123.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943014" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.123.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943015" version="1" comment="kernel-debug is &lt;3.10.0-1160.123.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943018" version="1" comment="kernel-doc is &lt;3.10.0-1160.123.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943019" version="1" comment="kernel-headers is &lt;3.10.0-1160.123.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943020" version="1" comment="kernel-tools is &lt;3.10.0-1160.123.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943021" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.123.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943023" version="1" comment="perf is &lt;3.10.0-1160.123.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943024" version="1" comment="python-perf is &lt;3.10.0-1160.123.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942736" version="1" comment="httpd is &lt;2.4.6-99.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942737" version="1" comment="httpd-devel is &lt;2.4.6-99.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942738" version="1" comment="httpd-manual is &lt;2.4.6-99.el7_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942739" version="1" comment="httpd-tools is &lt;2.4.6-99.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942740" version="1" comment="mod_ldap is &lt;2.4.6-99.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942741" version="1" comment="mod_proxy_html is &lt;2.4.6-99.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942742" version="1" comment="mod_session is &lt;2.4.6-99.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942743" version="1" comment="mod_ssl is &lt;2.4.6-99.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944402" version="1" comment="iwl100-firmware is &lt;39.31.5.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944403" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944404" version="1" comment="iwl105-firmware is &lt;18.168.6.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944405" version="1" comment="iwl135-firmware is &lt;18.168.6.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944406" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944407" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944408" version="1" comment="iwl3160-firmware is &lt;22.0.7.0-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944409" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944410" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944411" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944412" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944413" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944414" version="1" comment="iwl6000g2a-firmware is &lt;17.168.5.3-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944415" version="1" comment="iwl6000g2b-firmware is &lt;17.168.5.2-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944416" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944417" version="1" comment="iwl7260-firmware is &lt;22.0.7.0-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944933" version="1" comment="iwlax2xx-firmware is &lt;20240715-999.34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947247" version="1" comment="linux-firmware is &lt;20240715-999.34.git4c8fb21e.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947472" version="1" comment="httpd is &lt;2.4.6-99.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947473" version="1" comment="httpd-devel is &lt;2.4.6-99.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947474" version="1" comment="httpd-manual is &lt;2.4.6-99.el7_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947475" version="1" comment="httpd-tools is &lt;2.4.6-99.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947476" version="1" comment="mod_ldap is &lt;2.4.6-99.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947477" version="1" comment="mod_proxy_html is &lt;2.4.6-99.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947478" version="1" comment="mod_session is &lt;2.4.6-99.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947479" version="1" comment="mod_ssl is &lt;2.4.6-99.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950973" version="1" comment="freeradius is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950974" version="1" comment="freeradius-devel is &lt;3.0.13-15.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950975" version="1" comment="freeradius-doc is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950976" version="1" comment="freeradius-krb5 is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950977" version="1" comment="freeradius-ldap is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950978" version="1" comment="freeradius-mysql is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950979" version="1" comment="freeradius-perl is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950980" version="1" comment="freeradius-postgresql is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950981" version="1" comment="freeradius-python is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950982" version="1" comment="freeradius-sqlite is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950983" version="1" comment="freeradius-unixODBC is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950984" version="1" comment="freeradius-utils is &lt;3.0.13-15.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959681" version="1" comment="iwl100-firmware is &lt;39.31.5.1-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959682" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959683" version="1" comment="iwl105-firmware is &lt;18.168.6.1-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959684" version="1" comment="iwl135-firmware is &lt;18.168.6.1-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959685" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959686" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959687" version="1" comment="iwl3160-firmware is &lt;22.0.7.0-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959688" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959689" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959690" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959691" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959692" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959693" version="1" comment="iwl6000g2a-firmware is &lt;17.168.5.3-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959694" version="1" comment="iwl6000g2b-firmware is &lt;17.168.5.2-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959695" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959696" version="1" comment="iwl7260-firmware is &lt;22.0.7.0-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959697" version="1" comment="iwlax2xx-firmware is &lt;20241110-999.36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959698" version="1" comment="linux-firmware is &lt;20241110-999.36.git95bfe086.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959699" version="1" comment="linux-nano-firmware is &lt;20241110-999.36.git95bfe086.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960781" version="1" comment="mokutil is &lt;15.8-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960782" version="1" comment="shim-ia32 is &lt;15.8-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960783" version="1" comment="shim-x64 is &lt;15.8-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965282" version="1" comment="doxygen is &lt;1.8.5-4.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965283" version="1" comment="doxygen-doxywizard is &lt;1.8.5-4.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965284" version="1" comment="doxygen-latex is &lt;1.8.5-4.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975550" version="1" comment="freetype is &lt;2.8-15.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975551" version="1" comment="freetype-demos is &lt;2.8-15.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975552" version="1" comment="freetype-devel is &lt;2.8-15.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974746" version="1" comment="grub2 is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974747" version="1" comment="grub2-common is &lt;2.02-0.87.0.4.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974748" version="1" comment="grub2-efi-ia32 is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974749" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974750" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-0.87.0.4.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974751" version="1" comment="grub2-efi-x64 is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974752" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974753" version="1" comment="grub2-efi-x64-modules is &lt;2.02-0.87.0.4.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974754" version="1" comment="grub2-pc is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974755" version="1" comment="grub2-pc-modules is &lt;2.02-0.87.0.4.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974756" version="1" comment="grub2-tools is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974757" version="1" comment="grub2-tools-extra is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974758" version="1" comment="grub2-tools-minimal is &lt;2.02-0.87.0.4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976140" version="1" comment="openssh is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976141" version="1" comment="openssh-askpass is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976142" version="1" comment="openssh-cavs is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976143" version="1" comment="openssh-clients is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976144" version="1" comment="openssh-keycat is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976145" version="1" comment="openssh-ldap is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976146" version="1" comment="openssh-server is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976147" version="1" comment="openssh-server-sysvinit is &lt;7.4p1-23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976148" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-2.23.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982178" version="1" comment="libxslt is &lt;1.1.28-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982179" version="1" comment="libxslt-devel is &lt;1.1.28-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982180" version="1" comment="libxslt-python is &lt;1.1.28-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030661" version="1" comment="iwl100-firmware is &lt;39.31.5.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030662" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030663" version="1" comment="iwl105-firmware is &lt;18.168.6.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030664" version="1" comment="iwl135-firmware is &lt;18.168.6.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030665" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030666" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030667" version="1" comment="iwl3160-firmware is &lt;22.0.7.0-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030668" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030669" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030670" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030671" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030672" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030673" version="1" comment="iwl6000g2a-firmware is &lt;17.168.5.3-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030674" version="1" comment="iwl6000g2b-firmware is &lt;17.168.5.2-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030675" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030676" version="1" comment="iwl7260-firmware is &lt;22.0.7.0-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030677" version="1" comment="iwlax2xx-firmware is &lt;20251030-999.44.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030678" version="1" comment="linux-firmware is &lt;20251030-999.44.1.gite9292517.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039781" version="1" comment="httpd is &lt;2.4.6-99.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039782" version="1" comment="httpd-devel is &lt;2.4.6-99.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039783" version="1" comment="httpd-manual is &lt;2.4.6-99.el7_9.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039784" version="1" comment="httpd-tools is &lt;2.4.6-99.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039785" version="1" comment="mod_ldap is &lt;2.4.6-99.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039786" version="1" comment="mod_proxy_html is &lt;2.4.6-99.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039787" version="1" comment="mod_session is &lt;2.4.6-99.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039788" version="1" comment="mod_ssl is &lt;2.4.6-99.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040947" version="1" comment="python is &lt;2.7.5-94.el7_9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040948" version="1" comment="python-debug is &lt;2.7.5-94.el7_9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040949" version="1" comment="python-devel is &lt;2.7.5-94.el7_9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040950" version="1" comment="python-libs is &lt;2.7.5-94.el7_9.3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040951" version="1" comment="python-test is &lt;2.7.5-94.el7_9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040952" version="1" comment="python-tools is &lt;2.7.5-94.el7_9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040953" version="1" comment="tkinter is &lt;2.7.5-94.el7_9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041680" version="1" comment="bpftool is &lt;3.10.0-1160.125.1.0.15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041681" version="1" comment="kernel is &lt;3.10.0-1160.125.1.0.15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041682" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.125.1.0.15.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041683" version="1" comment="kernel-debug is &lt;3.10.0-1160.125.1.0.15.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041686" version="1" comment="kernel-doc is &lt;3.10.0-1160.125.1.0.15.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041687" version="1" comment="kernel-headers is &lt;3.10.0-1160.125.1.0.15.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041688" version="1" comment="kernel-tools is &lt;3.10.0-1160.125.1.0.15.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041689" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.125.1.0.15.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041691" version="1" comment="perf is &lt;3.10.0-1160.125.1.0.15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041692" version="1" comment="python-perf is &lt;3.10.0-1160.125.1.0.15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050055" version="1" comment="grub2 is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050056" version="1" comment="grub2-common is &lt;2.02-0.87.0.5.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050057" version="1" comment="grub2-efi-ia32 is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050058" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050059" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-0.87.0.5.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050060" version="1" comment="grub2-efi-x64 is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050061" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050062" version="1" comment="grub2-efi-x64-modules is &lt;2.02-0.87.0.5.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050063" version="1" comment="grub2-pc is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050064" version="1" comment="grub2-pc-modules is &lt;2.02-0.87.0.5.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050065" version="1" comment="grub2-tools is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050066" version="1" comment="grub2-tools-extra is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050067" version="1" comment="grub2-tools-minimal is &lt;2.02-0.87.0.5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051492" version="1" comment="python is &lt;2.7.5-94.el7_9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051493" version="1" comment="python-debug is &lt;2.7.5-94.el7_9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051494" version="1" comment="python-devel is &lt;2.7.5-94.el7_9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051495" version="1" comment="python-libs is &lt;2.7.5-94.el7_9.3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051496" version="1" comment="python-test is &lt;2.7.5-94.el7_9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051497" version="1" comment="python-tools is &lt;2.7.5-94.el7_9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051498" version="1" comment="tkinter is &lt;2.7.5-94.el7_9.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040954" version="1" comment="microcode_ctl is &lt;2.1-73.23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820139" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.55-2.4.7.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820140" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.55-2.4.7.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820141" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.55-2.4.7.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820142" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.55-2.4.7.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820143" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.55-2.4.7.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820144" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.55-2.4.7.2.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820145" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.55-2.4.7.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820146" version="1" comment="kernel is &lt;3.10.0-123.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820147" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.1.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820148" version="1" comment="kernel-debug is &lt;3.10.0-123.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820151" version="1" comment="kernel-doc is &lt;3.10.0-123.1.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820152" version="1" comment="kernel-headers is &lt;3.10.0-123.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820153" version="1" comment="kernel-tools is &lt;3.10.0-123.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820154" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820156" version="1" comment="perf is &lt;3.10.0-123.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820157" version="1" comment="python-perf is &lt;3.10.0-123.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820158" version="1" comment="openssl is &lt;1.0.1e-34.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820159" version="1" comment="openssl-devel is &lt;1.0.1e-34.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820160" version="1" comment="openssl-libs is &lt;1.0.1e-34.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820161" version="1" comment="openssl-perl is &lt;1.0.1e-34.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820162" version="1" comment="openssl-static is &lt;1.0.1e-34.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820163" version="1" comment="openssl098e is &lt;0.9.8e-29.el7_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820164" version="1" comment="gnutls is &lt;3.1.18-9.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820165" version="1" comment="gnutls-c++ is &lt;3.1.18-9.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820166" version="1" comment="gnutls-dane is &lt;3.1.18-9.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820167" version="1" comment="gnutls-devel is &lt;3.1.18-9.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820168" version="1" comment="gnutls-utils is &lt;3.1.18-9.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820169" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.0-6.1.13.3.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820170" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.0-6.1.13.3.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820171" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.0-6.1.13.3.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820172" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.0-6.1.13.3.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820173" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.0-6.1.13.3.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820174" version="1" comment="tomcat is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820175" version="1" comment="tomcat-admin-webapps is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820176" version="1" comment="tomcat-docs-webapp is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820177" version="1" comment="tomcat-el-2.2-api is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820178" version="1" comment="tomcat-javadoc is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820179" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820180" version="1" comment="tomcat-jsvc is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820181" version="1" comment="tomcat-lib is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820182" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820183" version="1" comment="tomcat-webapps is &lt;7.0.42-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820184" version="1" comment="libtasn1 is &lt;3.3-5.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820185" version="1" comment="libtasn1-devel is &lt;3.3-5.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820186" version="1" comment="libtasn1-tools is &lt;3.3-5.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820187" version="1" comment="mariadb is &lt;5.5.37-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820188" version="1" comment="mariadb-bench is &lt;5.5.37-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820189" version="1" comment="mariadb-devel is &lt;5.5.37-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820190" version="1" comment="mariadb-embedded is &lt;5.5.37-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820191" version="1" comment="mariadb-embedded-devel is &lt;5.5.37-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820192" version="1" comment="mariadb-libs is &lt;5.5.37-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820193" version="1" comment="mariadb-server is &lt;5.5.37-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820194" version="1" comment="mariadb-test is &lt;5.5.37-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820195" version="1" comment="json-c is &lt;0.11-4.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820196" version="1" comment="json-c-devel is &lt;0.11-4.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820197" version="1" comment="json-c-doc is &lt;0.11-4.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820198" version="1" comment="libcacard is &lt;1.5.3-60.el7_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820199" version="1" comment="libcacard-devel is &lt;1.5.3-60.el7_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820200" version="1" comment="libcacard-tools is &lt;1.5.3-60.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820201" version="1" comment="qemu-guest-agent is &lt;1.5.3-60.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820202" version="1" comment="qemu-img is &lt;1.5.3-60.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820203" version="1" comment="qemu-kvm is &lt;1.5.3-60.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820204" version="1" comment="qemu-kvm-common is &lt;1.5.3-60.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820205" version="1" comment="qemu-kvm-tools is &lt;1.5.3-60.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820206" version="1" comment="kernel is &lt;3.10.0-123.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820207" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.4.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820208" version="1" comment="kernel-debug is &lt;3.10.0-123.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820211" version="1" comment="kernel-doc is &lt;3.10.0-123.4.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820212" version="1" comment="kernel-headers is &lt;3.10.0-123.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820213" version="1" comment="kernel-tools is &lt;3.10.0-123.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820214" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820216" version="1" comment="perf is &lt;3.10.0-123.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820217" version="1" comment="python-perf is &lt;3.10.0-123.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820218" version="1" comment="docker is &lt;0.11.1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820219" version="1" comment="tomcat is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820220" version="1" comment="tomcat-admin-webapps is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820221" version="1" comment="tomcat-docs-webapp is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820222" version="1" comment="tomcat-el-2.2-api is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820223" version="1" comment="tomcat-javadoc is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820224" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820225" version="1" comment="tomcat-jsvc is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820226" version="1" comment="tomcat-lib is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820227" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820228" version="1" comment="tomcat-webapps is &lt;7.0.42-6.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820229" version="1" comment="libsmbclient is &lt;4.1.1-35.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820230" version="1" comment="libsmbclient-devel is &lt;4.1.1-35.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820231" version="1" comment="libwbclient is &lt;4.1.1-35.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820232" version="1" comment="libwbclient-devel is &lt;4.1.1-35.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820233" version="1" comment="samba is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820234" version="1" comment="samba-client is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820235" version="1" comment="samba-common is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820236" version="1" comment="samba-dc is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820237" version="1" comment="samba-dc-libs is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820238" version="1" comment="samba-devel is &lt;4.1.1-35.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820239" version="1" comment="samba-libs is &lt;4.1.1-35.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820240" version="1" comment="samba-pidl is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820241" version="1" comment="samba-python is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820242" version="1" comment="samba-test is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820243" version="1" comment="samba-test-devel is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820244" version="1" comment="samba-vfs-glusterfs is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820245" version="1" comment="samba-winbind is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820246" version="1" comment="samba-winbind-clients is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820247" version="1" comment="samba-winbind-krb5-locator is &lt;4.1.1-35.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820248" version="1" comment="samba-winbind-modules is &lt;4.1.1-35.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820249" version="1" comment="libvirt is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820250" version="1" comment="libvirt-client is &lt;1.1.1-29.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820251" version="1" comment="libvirt-daemon is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820252" version="1" comment="libvirt-daemon-config-network is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820253" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820254" version="1" comment="libvirt-daemon-driver-interface is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820255" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820256" version="1" comment="libvirt-daemon-driver-network is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820257" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820258" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820259" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820260" version="1" comment="libvirt-daemon-driver-secret is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820261" version="1" comment="libvirt-daemon-driver-storage is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820262" version="1" comment="libvirt-daemon-kvm is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820263" version="1" comment="libvirt-daemon-lxc is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820264" version="1" comment="libvirt-devel is &lt;1.1.1-29.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820265" version="1" comment="libvirt-docs is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820266" version="1" comment="libvirt-lock-sanlock is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820267" version="1" comment="libvirt-login-shell is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820268" version="1" comment="libvirt-python is &lt;1.1.1-29.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820269" version="1" comment="httpd is &lt;2.4.6-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820270" version="1" comment="httpd-devel is &lt;2.4.6-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820271" version="1" comment="httpd-manual is &lt;2.4.6-18.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820272" version="1" comment="httpd-tools is &lt;2.4.6-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820273" version="1" comment="mod_ldap is &lt;2.4.6-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820274" version="1" comment="mod_proxy_html is &lt;2.4.6-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820275" version="1" comment="mod_session is &lt;2.4.6-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820276" version="1" comment="mod_ssl is &lt;2.4.6-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820277" version="1" comment="kernel is &lt;3.10.0-123.4.4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820278" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.4.4.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820279" version="1" comment="kernel-debug is &lt;3.10.0-123.4.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820282" version="1" comment="kernel-doc is &lt;3.10.0-123.4.4.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820283" version="1" comment="kernel-headers is &lt;3.10.0-123.4.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820284" version="1" comment="kernel-tools is &lt;3.10.0-123.4.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820285" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.4.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820287" version="1" comment="perf is &lt;3.10.0-123.4.4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820288" version="1" comment="python-perf is &lt;3.10.0-123.4.4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820289" version="1" comment="libcacard is &lt;1.5.3-60.el7_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820290" version="1" comment="libcacard-devel is &lt;1.5.3-60.el7_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820291" version="1" comment="libcacard-tools is &lt;1.5.3-60.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820292" version="1" comment="qemu-guest-agent is &lt;1.5.3-60.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820293" version="1" comment="qemu-img is &lt;1.5.3-60.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820294" version="1" comment="qemu-kvm is &lt;1.5.3-60.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820295" version="1" comment="qemu-kvm-common is &lt;1.5.3-60.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820296" version="1" comment="qemu-kvm-tools is &lt;1.5.3-60.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820297" version="1" comment="libsmbclient is &lt;4.1.1-37.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820298" version="1" comment="libsmbclient-devel is &lt;4.1.1-37.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820299" version="1" comment="libwbclient is &lt;4.1.1-37.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820300" version="1" comment="libwbclient-devel is &lt;4.1.1-37.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820301" version="1" comment="samba is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820302" version="1" comment="samba-client is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820303" version="1" comment="samba-common is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820304" version="1" comment="samba-dc is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820305" version="1" comment="samba-dc-libs is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820306" version="1" comment="samba-devel is &lt;4.1.1-37.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820307" version="1" comment="samba-libs is &lt;4.1.1-37.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820308" version="1" comment="samba-pidl is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820309" version="1" comment="samba-python is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820310" version="1" comment="samba-test is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820311" version="1" comment="samba-test-devel is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820312" version="1" comment="samba-vfs-glusterfs is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820313" version="1" comment="samba-winbind is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820314" version="1" comment="samba-winbind-clients is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820315" version="1" comment="samba-winbind-krb5-locator is &lt;4.1.1-37.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820316" version="1" comment="samba-winbind-modules is &lt;4.1.1-37.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820317" version="1" comment="resteasy-base is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820318" version="1" comment="resteasy-base-atom-provider is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820319" version="1" comment="resteasy-base-jackson-provider is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820320" version="1" comment="resteasy-base-javadoc is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820321" version="1" comment="resteasy-base-jaxb-provider is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820322" version="1" comment="resteasy-base-jaxrs is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820323" version="1" comment="resteasy-base-jaxrs-all is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820324" version="1" comment="resteasy-base-jaxrs-api is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820325" version="1" comment="resteasy-base-jettison-provider is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820326" version="1" comment="resteasy-base-providers-pom is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820327" version="1" comment="resteasy-base-tjws is &lt;2.3.5-3.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820328" version="1" comment="php is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820329" version="1" comment="php-bcmath is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820330" version="1" comment="php-cli is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820331" version="1" comment="php-common is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820332" version="1" comment="php-dba is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820333" version="1" comment="php-devel is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820334" version="1" comment="php-embedded is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820335" version="1" comment="php-enchant is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820336" version="1" comment="php-fpm is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820337" version="1" comment="php-gd is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820338" version="1" comment="php-intl is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820339" version="1" comment="php-ldap is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820340" version="1" comment="php-mbstring is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820341" version="1" comment="php-mysql is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820342" version="1" comment="php-mysqlnd is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820343" version="1" comment="php-odbc is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820344" version="1" comment="php-pdo is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820345" version="1" comment="php-pgsql is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820346" version="1" comment="php-process is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820347" version="1" comment="php-pspell is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820348" version="1" comment="php-recode is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820349" version="1" comment="php-snmp is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820350" version="1" comment="php-soap is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820351" version="1" comment="php-xml is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820352" version="1" comment="php-xmlrpc is &lt;5.4.16-23.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820353" version="1" comment="kernel is &lt;3.10.0-123.6.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820354" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.6.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820355" version="1" comment="kernel-debug is &lt;3.10.0-123.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820358" version="1" comment="kernel-doc is &lt;3.10.0-123.6.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820359" version="1" comment="kernel-headers is &lt;3.10.0-123.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820360" version="1" comment="kernel-tools is &lt;3.10.0-123.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820361" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820363" version="1" comment="perf is &lt;3.10.0-123.6.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820364" version="1" comment="python-perf is &lt;3.10.0-123.6.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820365" version="1" comment="tomcat is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820366" version="1" comment="tomcat-admin-webapps is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820367" version="1" comment="tomcat-docs-webapp is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820368" version="1" comment="tomcat-el-2.2-api is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820369" version="1" comment="tomcat-javadoc is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820370" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820371" version="1" comment="tomcat-jsvc is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820372" version="1" comment="tomcat-lib is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820373" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820374" version="1" comment="tomcat-webapps is &lt;7.0.42-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820375" version="1" comment="nss is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820376" version="1" comment="nss-devel is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820377" version="1" comment="nss-pkcs11-devel is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820378" version="1" comment="nss-softokn is &lt;3.16.2-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820379" version="1" comment="nss-softokn-devel is &lt;3.16.2-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820380" version="1" comment="nss-softokn-freebl is &lt;3.16.2-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820381" version="1" comment="nss-softokn-freebl-devel is &lt;3.16.2-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820382" version="1" comment="nss-sysinit is &lt;3.16.2-2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820383" version="1" comment="nss-tools is &lt;3.16.2-2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820384" version="1" comment="nss-util is &lt;3.16.2-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820385" version="1" comment="nss-util-devel is &lt;3.16.2-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820386" version="1" comment="mod_wsgi is &lt;3.4-12.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820387" version="1" comment="glibc is &lt;2.17-55.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820388" version="1" comment="glibc-common is &lt;2.17-55.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820389" version="1" comment="glibc-devel is &lt;2.17-55.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820390" version="1" comment="glibc-headers is &lt;2.17-55.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820391" version="1" comment="glibc-static is &lt;2.17-55.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820392" version="1" comment="glibc-utils is &lt;2.17-55.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820393" version="1" comment="nscd is &lt;2.17-55.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820394" version="1" comment="httpcomponents-client is &lt;4.2.5-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820395" version="1" comment="httpcomponents-client-javadoc is &lt;4.2.5-5.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820396" version="1" comment="squid is &lt;3.3.8-12.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820397" version="1" comment="squid-sysvinit is &lt;3.3.8-12.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820398" version="1" comment="jakarta-commons-httpclient is &lt;3.1-16.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820399" version="1" comment="jakarta-commons-httpclient-demo is &lt;3.1-16.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820400" version="1" comment="jakarta-commons-httpclient-javadoc is &lt;3.1-16.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820401" version="1" comment="jakarta-commons-httpclient-manual is &lt;3.1-16.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820402" version="1" comment="procmail is &lt;3.22-34.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820403" version="1" comment="kernel is &lt;3.10.0-123.8.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820404" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.8.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820405" version="1" comment="kernel-debug is &lt;3.10.0-123.8.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820408" version="1" comment="kernel-doc is &lt;3.10.0-123.8.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820409" version="1" comment="kernel-headers is &lt;3.10.0-123.8.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820410" version="1" comment="kernel-tools is &lt;3.10.0-123.8.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820411" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.8.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820413" version="1" comment="perf is &lt;3.10.0-123.8.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820414" version="1" comment="python-perf is &lt;3.10.0-123.8.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820415" version="1" comment="haproxy is &lt;1.5.2-3.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820416" version="1" comment="bash is &lt;4.2.45-5.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820417" version="1" comment="bash-doc is &lt;4.2.45-5.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820418" version="1" comment="nss is &lt;3.16.2-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820419" version="1" comment="nss-devel is &lt;3.16.2-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820420" version="1" comment="nss-pkcs11-devel is &lt;3.16.2-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820421" version="1" comment="nss-softokn is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820422" version="1" comment="nss-softokn-devel is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820423" version="1" comment="nss-softokn-freebl is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820424" version="1" comment="nss-softokn-freebl-devel is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820425" version="1" comment="nss-sysinit is &lt;3.16.2-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820426" version="1" comment="nss-tools is &lt;3.16.2-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820427" version="1" comment="nss-util is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820428" version="1" comment="nss-util-devel is &lt;3.16.2-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820429" version="1" comment="xerces-j2 is &lt;2.11.0-17.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820430" version="1" comment="xerces-j2-demo is &lt;2.11.0-17.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820431" version="1" comment="xerces-j2-javadoc is &lt;2.11.0-17.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820432" version="1" comment="php is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820433" version="1" comment="php-bcmath is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820434" version="1" comment="php-cli is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820435" version="1" comment="php-common is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820436" version="1" comment="php-dba is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820437" version="1" comment="php-devel is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820438" version="1" comment="php-embedded is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820439" version="1" comment="php-enchant is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820440" version="1" comment="php-fpm is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820441" version="1" comment="php-gd is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820442" version="1" comment="php-intl is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820443" version="1" comment="php-ldap is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820444" version="1" comment="php-mbstring is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820445" version="1" comment="php-mysql is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820446" version="1" comment="php-mysqlnd is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820447" version="1" comment="php-odbc is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820448" version="1" comment="php-pdo is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820449" version="1" comment="php-pgsql is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820450" version="1" comment="php-process is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820451" version="1" comment="php-pspell is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820452" version="1" comment="php-recode is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820453" version="1" comment="php-snmp is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820454" version="1" comment="php-soap is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820455" version="1" comment="php-xml is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820456" version="1" comment="php-xmlrpc is &lt;5.4.16-23.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820457" version="1" comment="libvirt is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820458" version="1" comment="libvirt-client is &lt;1.1.1-29.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820459" version="1" comment="libvirt-daemon is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820460" version="1" comment="libvirt-daemon-config-network is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820461" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820462" version="1" comment="libvirt-daemon-driver-interface is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820463" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820464" version="1" comment="libvirt-daemon-driver-network is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820465" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820466" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820467" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820468" version="1" comment="libvirt-daemon-driver-secret is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820469" version="1" comment="libvirt-daemon-driver-storage is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820470" version="1" comment="libvirt-daemon-kvm is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820471" version="1" comment="libvirt-daemon-lxc is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820472" version="1" comment="libvirt-devel is &lt;1.1.1-29.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820473" version="1" comment="libvirt-docs is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820474" version="1" comment="libvirt-lock-sanlock is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820475" version="1" comment="libvirt-login-shell is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820476" version="1" comment="libvirt-python is &lt;1.1.1-29.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820477" version="1" comment="polkit-qt is &lt;0.103.0-10.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820478" version="1" comment="polkit-qt-devel is &lt;0.103.0-10.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820479" version="1" comment="polkit-qt-doc is &lt;0.103.0-10.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820480" version="1" comment="rsyslog is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820481" version="1" comment="rsyslog-crypto is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820482" version="1" comment="rsyslog-doc is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820483" version="1" comment="rsyslog-elasticsearch is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820484" version="1" comment="rsyslog-gnutls is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820485" version="1" comment="rsyslog-gssapi is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820486" version="1" comment="rsyslog-libdbi is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820487" version="1" comment="rsyslog-mmaudit is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820488" version="1" comment="rsyslog-mmjsonparse is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820489" version="1" comment="rsyslog-mmnormalize is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820490" version="1" comment="rsyslog-mmsnmptrapd is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820491" version="1" comment="rsyslog-mysql is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820492" version="1" comment="rsyslog-pgsql is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820493" version="1" comment="rsyslog-relp is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820494" version="1" comment="rsyslog-snmp is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820495" version="1" comment="rsyslog-udpspoof is &lt;7.4.7-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820496" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.71-2.5.3.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820497" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.71-2.5.3.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820498" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.71-2.5.3.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820499" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.71-2.5.3.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820500" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.71-2.5.3.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820501" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.71-2.5.3.1.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820502" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.71-2.5.3.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820503" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.33-1.13.5.0.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820504" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.33-1.13.5.0.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820505" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.33-1.13.5.0.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820506" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.33-1.13.5.0.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820507" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.33-1.13.5.0.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820508" version="1" comment="firefox is &lt;31.2.0-3.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820509" version="1" comment="xulrunner is &lt;31.2.0-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820510" version="1" comment="xulrunner-devel is &lt;31.2.0-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820511" version="1" comment="openssl is &lt;1.0.1e-34.el7_0.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820512" version="1" comment="openssl-devel is &lt;1.0.1e-34.el7_0.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820513" version="1" comment="openssl-libs is &lt;1.0.1e-34.el7_0.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820514" version="1" comment="openssl-perl is &lt;1.0.1e-34.el7_0.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820515" version="1" comment="openssl-static is &lt;1.0.1e-34.el7_0.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820516" version="1" comment="libxml2 is &lt;2.9.1-5.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820517" version="1" comment="libxml2-devel is &lt;2.9.1-5.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820518" version="1" comment="libxml2-python is &lt;2.9.1-5.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820519" version="1" comment="libxml2-static is &lt;2.9.1-5.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820520" version="1" comment="libcacard is &lt;1.5.3-60.el7_0.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820521" version="1" comment="libcacard-devel is &lt;1.5.3-60.el7_0.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820522" version="1" comment="libcacard-tools is &lt;1.5.3-60.el7_0.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820523" version="1" comment="qemu-guest-agent is &lt;1.5.3-60.el7_0.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820524" version="1" comment="qemu-img is &lt;1.5.3-60.el7_0.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820525" version="1" comment="qemu-kvm is &lt;1.5.3-60.el7_0.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820526" version="1" comment="qemu-kvm-common is &lt;1.5.3-60.el7_0.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820527" version="1" comment="qemu-kvm-tools is &lt;1.5.3-60.el7_0.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820528" version="1" comment="wireshark is &lt;1.10.3-12.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820529" version="1" comment="wireshark-devel is &lt;1.10.3-12.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820530" version="1" comment="wireshark-gnome is &lt;1.10.3-12.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820531" version="1" comment="kernel is &lt;3.10.0-123.9.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820532" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.9.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820533" version="1" comment="kernel-debug is &lt;3.10.0-123.9.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820536" version="1" comment="kernel-doc is &lt;3.10.0-123.9.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820537" version="1" comment="kernel-headers is &lt;3.10.0-123.9.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820538" version="1" comment="kernel-tools is &lt;3.10.0-123.9.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820539" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.9.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820541" version="1" comment="perf is &lt;3.10.0-123.9.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820542" version="1" comment="python-perf is &lt;3.10.0-123.9.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820543" version="1" comment="wget is &lt;1.14-10.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820544" version="1" comment="php is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820545" version="1" comment="php-bcmath is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820546" version="1" comment="php-cli is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820547" version="1" comment="php-common is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820548" version="1" comment="php-dba is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820549" version="1" comment="php-devel is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820550" version="1" comment="php-embedded is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820551" version="1" comment="php-enchant is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820552" version="1" comment="php-fpm is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820553" version="1" comment="php-gd is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820554" version="1" comment="php-intl is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820555" version="1" comment="php-ldap is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820556" version="1" comment="php-mbstring is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820557" version="1" comment="php-mysql is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820558" version="1" comment="php-mysqlnd is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820559" version="1" comment="php-odbc is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820560" version="1" comment="php-pdo is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820561" version="1" comment="php-pgsql is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820562" version="1" comment="php-process is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820563" version="1" comment="php-pspell is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820564" version="1" comment="php-recode is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820565" version="1" comment="php-snmp is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820566" version="1" comment="php-soap is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820567" version="1" comment="php-xml is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820568" version="1" comment="php-xmlrpc is &lt;5.4.16-23.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820569" version="1" comment="cups-filters is &lt;1.0.35-15.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820570" version="1" comment="cups-filters-devel is &lt;1.0.35-15.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820571" version="1" comment="cups-filters-libs is &lt;1.0.35-15.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820572" version="1" comment="libvncserver is &lt;0.9.9-9.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820573" version="1" comment="libvncserver-devel is &lt;0.9.9-9.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820574" version="1" comment="kdenetwork is &lt;4.10.5-8.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820575" version="1" comment="kdenetwork-common is &lt;4.10.5-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820576" version="1" comment="kdenetwork-devel is &lt;4.10.5-8.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820577" version="1" comment="kdenetwork-fileshare-samba is &lt;4.10.5-8.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820578" version="1" comment="kdenetwork-kdnssd is &lt;4.10.5-8.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820579" version="1" comment="kdenetwork-kget is &lt;4.10.5-8.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820580" version="1" comment="kdenetwork-kget-libs is &lt;4.10.5-8.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820581" version="1" comment="kdenetwork-kopete is &lt;4.10.5-8.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820582" version="1" comment="kdenetwork-kopete-devel is &lt;4.10.5-8.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820583" version="1" comment="kdenetwork-kopete-libs is &lt;4.10.5-8.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820584" version="1" comment="kdenetwork-krdc is &lt;4.10.5-8.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820585" version="1" comment="kdenetwork-krdc-devel is &lt;4.10.5-8.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820586" version="1" comment="kdenetwork-krdc-libs is &lt;4.10.5-8.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820587" version="1" comment="kdenetwork-krfb is &lt;4.10.5-8.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820588" version="1" comment="kdenetwork-krfb-libs is &lt;4.10.5-8.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820589" version="1" comment="gnutls is &lt;3.1.18-10.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820590" version="1" comment="gnutls-c++ is &lt;3.1.18-10.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820591" version="1" comment="gnutls-dane is &lt;3.1.18-10.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820592" version="1" comment="gnutls-devel is &lt;3.1.18-10.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820593" version="1" comment="gnutls-utils is &lt;3.1.18-10.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820594" version="1" comment="mariadb is &lt;5.5.40-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820595" version="1" comment="mariadb-bench is &lt;5.5.40-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820596" version="1" comment="mariadb-devel is &lt;5.5.40-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820597" version="1" comment="mariadb-embedded is &lt;5.5.40-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820598" version="1" comment="mariadb-embedded-devel is &lt;5.5.40-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820599" version="1" comment="mariadb-libs is &lt;5.5.40-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820600" version="1" comment="mariadb-server is &lt;5.5.40-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820601" version="1" comment="mariadb-test is &lt;5.5.40-1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820602" version="1" comment="libXfont is &lt;1.4.7-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820603" version="1" comment="libXfont-devel is &lt;1.4.7-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820604" version="1" comment="ruby is &lt;2.0.0.353-22.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820605" version="1" comment="ruby-devel is &lt;2.0.0.353-22.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820606" version="1" comment="ruby-doc is &lt;2.0.0.353-22.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820607" version="1" comment="ruby-irb is &lt;2.0.0.353-22.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820608" version="1" comment="ruby-libs is &lt;2.0.0.353-22.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820609" version="1" comment="ruby-tcltk is &lt;2.0.0.353-22.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820610" version="1" comment="rubygem-bigdecimal is &lt;1.2.0-22.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820611" version="1" comment="rubygem-io-console is &lt;0.4.2-22.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820612" version="1" comment="rubygem-json is &lt;1.7.7-22.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820613" version="1" comment="rubygem-minitest is &lt;4.3.2-22.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820614" version="1" comment="rubygem-psych is &lt;2.0.0-22.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820615" version="1" comment="rubygem-rake is &lt;0.9.6-22.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820616" version="1" comment="rubygem-rdoc is &lt;4.0.0-22.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820617" version="1" comment="rubygems is &lt;2.0.14-22.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820618" version="1" comment="rubygems-devel is &lt;2.0.14-22.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820619" version="1" comment="firefox is &lt;31.3.0-3.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820620" version="1" comment="nss is &lt;3.16.2.3-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820621" version="1" comment="nss-devel is &lt;3.16.2.3-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820622" version="1" comment="nss-pkcs11-devel is &lt;3.16.2.3-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820623" version="1" comment="nss-softokn is &lt;3.16.2.3-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820624" version="1" comment="nss-softokn-devel is &lt;3.16.2.3-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820625" version="1" comment="nss-softokn-freebl is &lt;3.16.2.3-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820626" version="1" comment="nss-softokn-freebl-devel is &lt;3.16.2.3-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820627" version="1" comment="nss-sysinit is &lt;3.16.2.3-2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820628" version="1" comment="nss-tools is &lt;3.16.2.3-2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820629" version="1" comment="nss-util is &lt;3.16.2.3-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820630" version="1" comment="nss-util-devel is &lt;3.16.2.3-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820631" version="1" comment="wpa_supplicant is &lt;2.0-13.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820632" version="1" comment="kernel is &lt;3.10.0-123.13.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820633" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.13.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820634" version="1" comment="kernel-debug is &lt;3.10.0-123.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820637" version="1" comment="kernel-doc is &lt;3.10.0-123.13.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820638" version="1" comment="kernel-headers is &lt;3.10.0-123.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820639" version="1" comment="kernel-tools is &lt;3.10.0-123.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820640" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820642" version="1" comment="perf is &lt;3.10.0-123.13.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820643" version="1" comment="python-perf is &lt;3.10.0-123.13.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820644" version="1" comment="rpm is &lt;4.11.1-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820645" version="1" comment="rpm-apidocs is &lt;4.11.1-18.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820646" version="1" comment="rpm-build is &lt;4.11.1-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820647" version="1" comment="rpm-build-libs is &lt;4.11.1-18.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820648" version="1" comment="rpm-cron is &lt;4.11.1-18.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820649" version="1" comment="rpm-devel is &lt;4.11.1-18.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820650" version="1" comment="rpm-libs is &lt;4.11.1-18.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820651" version="1" comment="rpm-python is &lt;4.11.1-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820652" version="1" comment="rpm-sign is &lt;4.11.1-18.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820653" version="1" comment="xorg-x11-server-Xdmx is &lt;1.15.0-7.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820654" version="1" comment="xorg-x11-server-Xephyr is &lt;1.15.0-7.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820655" version="1" comment="xorg-x11-server-Xnest is &lt;1.15.0-7.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820656" version="1" comment="xorg-x11-server-Xorg is &lt;1.15.0-7.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820657" version="1" comment="xorg-x11-server-Xvfb is &lt;1.15.0-7.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820658" version="1" comment="xorg-x11-server-common is &lt;1.15.0-7.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820659" version="1" comment="xorg-x11-server-devel is &lt;1.15.0-7.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820660" version="1" comment="xorg-x11-server-source is &lt;1.15.0-7.el7_0.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820661" version="1" comment="bind is &lt;9.9.4-14.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820662" version="1" comment="bind-chroot is &lt;9.9.4-14.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820663" version="1" comment="bind-devel is &lt;9.9.4-14.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820664" version="1" comment="bind-libs is &lt;9.9.4-14.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820665" version="1" comment="bind-libs-lite is &lt;9.9.4-14.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820666" version="1" comment="bind-license is &lt;9.9.4-14.el7_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820667" version="1" comment="bind-lite-devel is &lt;9.9.4-14.el7_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820668" version="1" comment="bind-sdb is &lt;9.9.4-14.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820669" version="1" comment="bind-sdb-chroot is &lt;9.9.4-14.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820670" version="1" comment="bind-utils is &lt;9.9.4-14.el7_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820671" version="1" comment="mailx is &lt;12.5-12.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820672" version="1" comment="kernel is &lt;3.10.0-123.13.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820673" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.13.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820674" version="1" comment="kernel-debug is &lt;3.10.0-123.13.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820677" version="1" comment="kernel-doc is &lt;3.10.0-123.13.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820678" version="1" comment="kernel-headers is &lt;3.10.0-123.13.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820679" version="1" comment="kernel-tools is &lt;3.10.0-123.13.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820680" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.13.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820682" version="1" comment="perf is &lt;3.10.0-123.13.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820683" version="1" comment="python-perf is &lt;3.10.0-123.13.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820684" version="1" comment="jasper is &lt;1.900.1-26.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820685" version="1" comment="jasper-devel is &lt;1.900.1-26.el7_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820686" version="1" comment="jasper-libs is &lt;1.900.1-26.el7_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820687" version="1" comment="jasper-utils is &lt;1.900.1-26.el7_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820688" version="1" comment="glibc is &lt;2.17-55.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820689" version="1" comment="glibc-common is &lt;2.17-55.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820690" version="1" comment="glibc-devel is &lt;2.17-55.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820691" version="1" comment="glibc-headers is &lt;2.17-55.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820692" version="1" comment="glibc-static is &lt;2.17-55.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820693" version="1" comment="glibc-utils is &lt;2.17-55.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820694" version="1" comment="nscd is &lt;2.17-55.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820695" version="1" comment="ntp is &lt;4.2.6p5-19.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820696" version="1" comment="ntp-doc is &lt;4.2.6p5-19.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820697" version="1" comment="ntp-perl is &lt;4.2.6p5-19.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820698" version="1" comment="ntpdate is &lt;4.2.6p5-19.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820699" version="1" comment="sntp is &lt;4.2.6p5-19.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820700" version="1" comment="libvirt is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820701" version="1" comment="libvirt-client is &lt;1.1.1-29.el7_0.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820702" version="1" comment="libvirt-daemon is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820703" version="1" comment="libvirt-daemon-config-network is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820704" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820705" version="1" comment="libvirt-daemon-driver-interface is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820706" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820707" version="1" comment="libvirt-daemon-driver-network is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820708" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820709" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820710" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820711" version="1" comment="libvirt-daemon-driver-secret is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820712" version="1" comment="libvirt-daemon-driver-storage is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820713" version="1" comment="libvirt-daemon-kvm is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820714" version="1" comment="libvirt-daemon-lxc is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820715" version="1" comment="libvirt-devel is &lt;1.1.1-29.el7_0.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820716" version="1" comment="libvirt-docs is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820717" version="1" comment="libvirt-lock-sanlock is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820718" version="1" comment="libvirt-login-shell is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820719" version="1" comment="libvirt-python is &lt;1.1.1-29.el7_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820720" version="1" comment="firefox is &lt;31.4.0-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820721" version="1" comment="xulrunner is &lt;31.4.0-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820722" version="1" comment="xulrunner-devel is &lt;31.4.0-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820723" version="1" comment="openssl is &lt;1.0.1e-34.el7_0.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820724" version="1" comment="openssl-devel is &lt;1.0.1e-34.el7_0.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820725" version="1" comment="openssl-libs is &lt;1.0.1e-34.el7_0.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820726" version="1" comment="openssl-perl is &lt;1.0.1e-34.el7_0.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820727" version="1" comment="openssl-static is &lt;1.0.1e-34.el7_0.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820728" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.75-2.5.4.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820729" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.75-2.5.4.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820730" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.75-2.5.4.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820731" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.75-2.5.4.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820732" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.75-2.5.4.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820733" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.75-2.5.4.2.el7_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820734" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.75-2.5.4.2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820735" version="1" comment="jasper is &lt;1.900.1-26.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820736" version="1" comment="jasper-devel is &lt;1.900.1-26.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820737" version="1" comment="jasper-libs is &lt;1.900.1-26.el7_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820738" version="1" comment="jasper-utils is &lt;1.900.1-26.el7_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820739" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.34-1.13.6.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820740" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.34-1.13.6.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820741" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.34-1.13.6.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820742" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.34-1.13.6.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820743" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.34-1.13.6.1.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820744" version="1" comment="glibc is &lt;2.17-55.el7_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820745" version="1" comment="glibc-common is &lt;2.17-55.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820746" version="1" comment="glibc-devel is &lt;2.17-55.el7_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820747" version="1" comment="glibc-headers is &lt;2.17-55.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820748" version="1" comment="glibc-static is &lt;2.17-55.el7_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820749" version="1" comment="glibc-utils is &lt;2.17-55.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820750" version="1" comment="nscd is &lt;2.17-55.el7_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820751" version="1" comment="libyaml is &lt;0.1.4-11.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820752" version="1" comment="libyaml-devel is &lt;0.1.4-11.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820753" version="1" comment="kernel is &lt;3.10.0-123.20.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820754" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-123.20.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820755" version="1" comment="kernel-debug is &lt;3.10.0-123.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820758" version="1" comment="kernel-doc is &lt;3.10.0-123.20.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820759" version="1" comment="kernel-headers is &lt;3.10.0-123.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820760" version="1" comment="kernel-tools is &lt;3.10.0-123.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820761" version="1" comment="kernel-tools-libs is &lt;3.10.0-123.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820763" version="1" comment="perf is &lt;3.10.0-123.20.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820764" version="1" comment="python-perf is &lt;3.10.0-123.20.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820765" version="1" comment="mariadb is &lt;5.5.41-2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820766" version="1" comment="mariadb-bench is &lt;5.5.41-2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820767" version="1" comment="mariadb-devel is &lt;5.5.41-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820768" version="1" comment="mariadb-embedded is &lt;5.5.41-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820769" version="1" comment="mariadb-embedded-devel is &lt;5.5.41-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820770" version="1" comment="mariadb-libs is &lt;5.5.41-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820771" version="1" comment="mariadb-server is &lt;5.5.41-2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820772" version="1" comment="mariadb-test is &lt;5.5.41-2.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820773" version="1" comment="mod_dav_svn is &lt;1.7.14-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820774" version="1" comment="subversion is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820775" version="1" comment="subversion-devel is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820776" version="1" comment="subversion-gnome is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820777" version="1" comment="subversion-javahl is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820778" version="1" comment="subversion-kde is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820779" version="1" comment="subversion-libs is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820780" version="1" comment="subversion-perl is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820781" version="1" comment="subversion-python is &lt;1.7.14-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820782" version="1" comment="subversion-ruby is &lt;1.7.14-7.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820783" version="1" comment="subversion-tools is &lt;1.7.14-7.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820784" version="1" comment="libsmbclient is &lt;4.1.1-38.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820785" version="1" comment="libsmbclient-devel is &lt;4.1.1-38.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820786" version="1" comment="libwbclient is &lt;4.1.1-38.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820787" version="1" comment="libwbclient-devel is &lt;4.1.1-38.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820788" version="1" comment="samba is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820789" version="1" comment="samba-client is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820790" version="1" comment="samba-common is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820791" version="1" comment="samba-dc is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820792" version="1" comment="samba-dc-libs is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820793" version="1" comment="samba-devel is &lt;4.1.1-38.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820794" version="1" comment="samba-libs is &lt;4.1.1-38.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820795" version="1" comment="samba-pidl is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820796" version="1" comment="samba-python is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820797" version="1" comment="samba-test is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820798" version="1" comment="samba-test-devel is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820799" version="1" comment="samba-vfs-glusterfs is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820800" version="1" comment="samba-winbind is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820801" version="1" comment="samba-winbind-clients is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820802" version="1" comment="samba-winbind-krb5-locator is &lt;4.1.1-38.el7_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820803" version="1" comment="samba-winbind-modules is &lt;4.1.1-38.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820804" version="1" comment="firefox is &lt;31.5.0-2.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820805" version="1" comment="xulrunner is &lt;31.5.0-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820806" version="1" comment="xulrunner-devel is &lt;31.5.0-1.el7_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820807" version="1" comment="kernel is &lt;3.10.0-229.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820808" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-229.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820809" version="1" comment="kernel-debug is &lt;3.10.0-229.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820812" version="1" comment="kernel-doc is &lt;3.10.0-229.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820813" version="1" comment="kernel-headers is &lt;3.10.0-229.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820814" version="1" comment="kernel-tools is &lt;3.10.0-229.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820815" version="1" comment="kernel-tools-libs is &lt;3.10.0-229.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820817" version="1" comment="perf is &lt;3.10.0-229.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820818" version="1" comment="python-perf is &lt;3.10.0-229.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820819" version="1" comment="hivex is &lt;1.3.10-5.7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820820" version="1" comment="hivex-devel is &lt;1.3.10-5.7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820821" version="1" comment="ocaml-hivex is &lt;1.3.10-5.7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820822" version="1" comment="ocaml-hivex-devel is &lt;1.3.10-5.7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820823" version="1" comment="perl-hivex is &lt;1.3.10-5.7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820824" version="1" comment="python-hivex is &lt;1.3.10-5.7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820825" version="1" comment="ruby-hivex is &lt;1.3.10-5.7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820826" version="1" comment="libvirt is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820827" version="1" comment="libvirt-client is &lt;1.2.8-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820828" version="1" comment="libvirt-daemon is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820829" version="1" comment="libvirt-daemon-config-network is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820830" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820831" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820832" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820833" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820834" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820835" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820836" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820837" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820838" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820839" version="1" comment="libvirt-daemon-kvm is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820840" version="1" comment="libvirt-daemon-lxc is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820841" version="1" comment="libvirt-devel is &lt;1.2.8-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820842" version="1" comment="libvirt-docs is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820843" version="1" comment="libvirt-lock-sanlock is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820844" version="1" comment="libvirt-login-shell is &lt;1.2.8-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820845" version="1" comment="httpd is &lt;2.4.6-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820846" version="1" comment="httpd-devel is &lt;2.4.6-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820847" version="1" comment="httpd-manual is &lt;2.4.6-31.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820848" version="1" comment="httpd-tools is &lt;2.4.6-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820849" version="1" comment="mod_ldap is &lt;2.4.6-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820850" version="1" comment="mod_proxy_html is &lt;2.4.6-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820851" version="1" comment="mod_session is &lt;2.4.6-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820852" version="1" comment="mod_ssl is &lt;2.4.6-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820853" version="1" comment="glibc is &lt;2.17-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820854" version="1" comment="glibc-common is &lt;2.17-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820855" version="1" comment="glibc-devel is &lt;2.17-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820856" version="1" comment="glibc-headers is &lt;2.17-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820857" version="1" comment="glibc-static is &lt;2.17-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820858" version="1" comment="glibc-utils is &lt;2.17-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820859" version="1" comment="nscd is &lt;2.17-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820860" version="1" comment="pcre is &lt;8.32-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820861" version="1" comment="pcre-devel is &lt;8.32-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820862" version="1" comment="pcre-static is &lt;8.32-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820863" version="1" comment="pcre-tools is &lt;8.32-14.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820864" version="1" comment="libcacard is &lt;1.5.3-86.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820865" version="1" comment="libcacard-devel is &lt;1.5.3-86.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820866" version="1" comment="libcacard-tools is &lt;1.5.3-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820867" version="1" comment="qemu-img is &lt;1.5.3-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820868" version="1" comment="qemu-kvm is &lt;1.5.3-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820869" version="1" comment="qemu-kvm-common is &lt;1.5.3-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820870" version="1" comment="qemu-kvm-tools is &lt;1.5.3-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820871" version="1" comment="389-ds-base is &lt;1.3.3.1-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820872" version="1" comment="389-ds-base-devel is &lt;1.3.3.1-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820873" version="1" comment="389-ds-base-libs is &lt;1.3.3.1-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820874" version="1" comment="openssh is &lt;6.6.1p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820875" version="1" comment="openssh-askpass is &lt;6.6.1p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820876" version="1" comment="openssh-clients is &lt;6.6.1p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820877" version="1" comment="openssh-keycat is &lt;6.6.1p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820878" version="1" comment="openssh-ldap is &lt;6.6.1p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820879" version="1" comment="openssh-server is &lt;6.6.1p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820880" version="1" comment="openssh-server-sysvinit is &lt;6.6.1p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820881" version="1" comment="pam_ssh_agent_auth is &lt;0.9.3-9.11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820882" version="1" comment="krb5-devel is &lt;1.12.2-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820883" version="1" comment="krb5-libs is &lt;1.12.2-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820884" version="1" comment="krb5-pkinit is &lt;1.12.2-14.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820885" version="1" comment="krb5-server is &lt;1.12.2-14.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820886" version="1" comment="krb5-server-ldap is &lt;1.12.2-14.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820887" version="1" comment="krb5-workstation is &lt;1.12.2-14.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820888" version="1" comment="ipa-admintools is &lt;4.1.0-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820889" version="1" comment="ipa-client is &lt;4.1.0-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820890" version="1" comment="ipa-python is &lt;4.1.0-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820891" version="1" comment="ipa-server is &lt;4.1.0-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820892" version="1" comment="ipa-server-trust-ad is &lt;4.1.0-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820893" version="1" comment="clutter is &lt;1.14.4-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820894" version="1" comment="clutter-devel is &lt;1.14.4-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820895" version="1" comment="clutter-doc is &lt;1.14.4-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820896" version="1" comment="cogl is &lt;1.14.0-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820897" version="1" comment="cogl-devel is &lt;1.14.0-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820898" version="1" comment="cogl-doc is &lt;1.14.0-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820899" version="1" comment="gnome-shell is &lt;3.8.4-45.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820900" version="1" comment="gnome-shell-browser-plugin is &lt;3.8.4-45.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820901" version="1" comment="mutter is &lt;3.8.4-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820902" version="1" comment="mutter-devel is &lt;3.8.4-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820903" version="1" comment="thunderbird is &lt;31.5.0-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820904" version="1" comment="bind is &lt;9.9.4-18.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820905" version="1" comment="bind-chroot is &lt;9.9.4-18.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820906" version="1" comment="bind-devel is &lt;9.9.4-18.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820907" version="1" comment="bind-libs is &lt;9.9.4-18.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820908" version="1" comment="bind-libs-lite is &lt;9.9.4-18.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820909" version="1" comment="bind-license is &lt;9.9.4-18.el7_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820910" version="1" comment="bind-lite-devel is &lt;9.9.4-18.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820911" version="1" comment="bind-sdb is &lt;9.9.4-18.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820912" version="1" comment="bind-sdb-chroot is &lt;9.9.4-18.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820913" version="1" comment="bind-utils is &lt;9.9.4-18.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820914" version="1" comment="freetype is &lt;2.4.11-10.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820915" version="1" comment="freetype-demos is &lt;2.4.11-10.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820916" version="1" comment="freetype-devel is &lt;2.4.11-10.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820917" version="1" comment="unzip is &lt;6.0-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820918" version="1" comment="openssl is &lt;1.0.1e-42.el7_1.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820919" version="1" comment="openssl-devel is &lt;1.0.1e-42.el7_1.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820920" version="1" comment="openssl-libs is &lt;1.0.1e-42.el7_1.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820921" version="1" comment="openssl-perl is &lt;1.0.1e-42.el7_1.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820922" version="1" comment="openssl-static is &lt;1.0.1e-42.el7_1.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820923" version="1" comment="firefox is &lt;31.5.3-3.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820924" version="1" comment="kernel is &lt;3.10.0-229.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820925" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-229.1.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820926" version="1" comment="kernel-debug is &lt;3.10.0-229.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820929" version="1" comment="kernel-doc is &lt;3.10.0-229.1.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820930" version="1" comment="kernel-headers is &lt;3.10.0-229.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820931" version="1" comment="kernel-tools is &lt;3.10.0-229.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820932" version="1" comment="kernel-tools-libs is &lt;3.10.0-229.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820934" version="1" comment="perf is &lt;3.10.0-229.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820935" version="1" comment="python-perf is &lt;3.10.0-229.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820936" version="1" comment="ipa-admintools is &lt;4.1.0-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820937" version="1" comment="ipa-client is &lt;4.1.0-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820938" version="1" comment="ipa-python is &lt;4.1.0-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820939" version="1" comment="ipa-server is &lt;4.1.0-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820940" version="1" comment="ipa-server-trust-ad is &lt;4.1.0-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820941" version="1" comment="slapi-nis is &lt;0.54-3.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820942" version="1" comment="setroubleshoot is &lt;3.2.17-4.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820943" version="1" comment="setroubleshoot-server is &lt;3.2.17-4.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820944" version="1" comment="libxml2 is &lt;2.9.1-5.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820945" version="1" comment="libxml2-devel is &lt;2.9.1-5.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820946" version="1" comment="libxml2-python is &lt;2.9.1-5.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820947" version="1" comment="libxml2-static is &lt;2.9.1-5.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820948" version="1" comment="postgresql is &lt;9.2.10-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820949" version="1" comment="postgresql-contrib is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820950" version="1" comment="postgresql-devel is &lt;9.2.10-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820951" version="1" comment="postgresql-docs is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820952" version="1" comment="postgresql-libs is &lt;9.2.10-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820953" version="1" comment="postgresql-plperl is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820954" version="1" comment="postgresql-plpython is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820955" version="1" comment="postgresql-pltcl is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820956" version="1" comment="postgresql-server is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820957" version="1" comment="postgresql-test is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820958" version="1" comment="postgresql-upgrade is &lt;9.2.10-2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820959" version="1" comment="firefox is &lt;31.6.0-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820960" version="1" comment="xulrunner is &lt;31.6.0-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820961" version="1" comment="xulrunner-devel is &lt;31.6.0-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820962" version="1" comment="flac is &lt;1.3.0-5.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820963" version="1" comment="flac-devel is &lt;1.3.0-5.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820964" version="1" comment="flac-libs is &lt;1.3.0-5.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820965" version="1" comment="thunderbird is &lt;31.6.0-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820966" version="1" comment="xorg-x11-server-Xdmx is &lt;1.15.0-33.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820967" version="1" comment="xorg-x11-server-Xephyr is &lt;1.15.0-33.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820968" version="1" comment="xorg-x11-server-Xnest is &lt;1.15.0-33.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820969" version="1" comment="xorg-x11-server-Xorg is &lt;1.15.0-33.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820970" version="1" comment="xorg-x11-server-Xvfb is &lt;1.15.0-33.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820971" version="1" comment="xorg-x11-server-common is &lt;1.15.0-33.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820972" version="1" comment="xorg-x11-server-devel is &lt;1.15.0-33.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820973" version="1" comment="xorg-x11-server-source is &lt;1.15.0-33.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820974" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.79-2.5.5.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820975" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.79-2.5.5.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820976" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.79-2.5.5.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820977" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.79-2.5.5.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820978" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.79-2.5.5.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820979" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.79-2.5.5.1.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820980" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.79-2.5.5.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820981" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.35-1.13.7.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820982" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.35-1.13.7.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820983" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.35-1.13.7.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820984" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.35-1.13.7.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820985" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.35-1.13.7.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820986" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.45-30.b13.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820987" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.45-30.b13.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820988" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.45-30.b13.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820989" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.45-30.b13.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820990" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.45-30.b13.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820991" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.45-30.b13.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820992" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.45-30.b13.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820993" version="1" comment="389-ds-base is &lt;1.3.3.1-16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820994" version="1" comment="389-ds-base-devel is &lt;1.3.3.1-16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820995" version="1" comment="389-ds-base-libs is &lt;1.3.3.1-16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820996" version="1" comment="pcs is &lt;0.9.137-13.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820997" version="1" comment="python-clufter is &lt;0.9.137-13.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820998" version="1" comment="tomcat is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820999" version="1" comment="tomcat-admin-webapps is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821000" version="1" comment="tomcat-docs-webapp is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821001" version="1" comment="tomcat-el-2.2-api is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821002" version="1" comment="tomcat-javadoc is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821003" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821004" version="1" comment="tomcat-jsvc is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821005" version="1" comment="tomcat-lib is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821006" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821007" version="1" comment="tomcat-webapps is &lt;7.0.54-2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821008" version="1" comment="kexec-tools is &lt;2.0.7-19.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821009" version="1" comment="kexec-tools-anaconda-addon is &lt;2.0.7-19.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821010" version="1" comment="kexec-tools-eppic is &lt;2.0.7-19.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821011" version="1" comment="kernel is &lt;3.10.0-229.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821012" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-229.4.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821013" version="1" comment="kernel-debug is &lt;3.10.0-229.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821016" version="1" comment="kernel-doc is &lt;3.10.0-229.4.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821017" version="1" comment="kernel-headers is &lt;3.10.0-229.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821018" version="1" comment="kernel-tools is &lt;3.10.0-229.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821019" version="1" comment="kernel-tools-libs is &lt;3.10.0-229.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821021" version="1" comment="perf is &lt;3.10.0-229.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821022" version="1" comment="python-perf is &lt;3.10.0-229.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821023" version="1" comment="firefox is &lt;38.0-3.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821024" version="1" comment="libcacard is &lt;1.5.3-86.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821025" version="1" comment="libcacard-devel is &lt;1.5.3-86.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821026" version="1" comment="libcacard-tools is &lt;1.5.3-86.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821027" version="1" comment="qemu-img is &lt;1.5.3-86.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821028" version="1" comment="qemu-kvm is &lt;1.5.3-86.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821029" version="1" comment="qemu-kvm-common is &lt;1.5.3-86.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821030" version="1" comment="qemu-kvm-tools is &lt;1.5.3-86.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821031" version="1" comment="thunderbird is &lt;31.7.0-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821032" version="1" comment="openssl is &lt;1.0.1e-42.el7_1.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821033" version="1" comment="openssl-devel is &lt;1.0.1e-42.el7_1.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821034" version="1" comment="openssl-libs is &lt;1.0.1e-42.el7_1.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821035" version="1" comment="openssl-perl is &lt;1.0.1e-42.el7_1.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821036" version="1" comment="openssl-static is &lt;1.0.1e-42.el7_1.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821037" version="1" comment="abrt is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821038" version="1" comment="abrt-addon-ccpp is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821039" version="1" comment="abrt-addon-kerneloops is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821040" version="1" comment="abrt-addon-pstoreoops is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821041" version="1" comment="abrt-addon-python is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821042" version="1" comment="abrt-addon-upload-watch is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821043" version="1" comment="abrt-addon-vmcore is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821044" version="1" comment="abrt-addon-xorg is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821045" version="1" comment="abrt-cli is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821046" version="1" comment="abrt-console-notification is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821047" version="1" comment="abrt-dbus is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821048" version="1" comment="abrt-desktop is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821049" version="1" comment="abrt-devel is &lt;2.1.11-22.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821050" version="1" comment="abrt-gui is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821051" version="1" comment="abrt-gui-devel is &lt;2.1.11-22.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821052" version="1" comment="abrt-gui-libs is &lt;2.1.11-22.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821053" version="1" comment="abrt-libs is &lt;2.1.11-22.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821054" version="1" comment="abrt-python is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821055" version="1" comment="abrt-python-doc is &lt;2.1.11-22.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821056" version="1" comment="abrt-retrace-client is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821057" version="1" comment="abrt-tui is &lt;2.1.11-22.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821058" version="1" comment="libreport is &lt;2.1.11-23.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821059" version="1" comment="libreport-anaconda is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821060" version="1" comment="libreport-cli is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821061" version="1" comment="libreport-compat is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821062" version="1" comment="libreport-devel is &lt;2.1.11-23.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821063" version="1" comment="libreport-filesystem is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821064" version="1" comment="libreport-gtk is &lt;2.1.11-23.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821065" version="1" comment="libreport-gtk-devel is &lt;2.1.11-23.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821066" version="1" comment="libreport-newt is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821067" version="1" comment="libreport-plugin-bugzilla is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821068" version="1" comment="libreport-plugin-kerneloops is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821069" version="1" comment="libreport-plugin-logger is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821070" version="1" comment="libreport-plugin-mailx is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821071" version="1" comment="libreport-plugin-reportuploader is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821072" version="1" comment="libreport-plugin-ureport is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821073" version="1" comment="libreport-python is &lt;2.1.11-23.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821074" version="1" comment="libreport-web is &lt;2.1.11-23.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821075" version="1" comment="libreport-web-devel is &lt;2.1.11-23.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821076" version="1" comment="wpa_supplicant is &lt;2.0-17.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821077" version="1" comment="openssl is &lt;1.0.1e-42.el7_1.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821078" version="1" comment="openssl-devel is &lt;1.0.1e-42.el7_1.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821079" version="1" comment="openssl-libs is &lt;1.0.1e-42.el7_1.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821080" version="1" comment="openssl-perl is &lt;1.0.1e-42.el7_1.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821081" version="1" comment="openssl-static is &lt;1.0.1e-42.el7_1.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821082" version="1" comment="cups is &lt;1.6.3-17.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821083" version="1" comment="cups-client is &lt;1.6.3-17.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821084" version="1" comment="cups-devel is &lt;1.6.3-17.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821085" version="1" comment="cups-filesystem is &lt;1.6.3-17.el7_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821086" version="1" comment="cups-ipptool is &lt;1.6.3-17.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821087" version="1" comment="cups-libs is &lt;1.6.3-17.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821088" version="1" comment="cups-lpd is &lt;1.6.3-17.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821089" version="1" comment="php is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821090" version="1" comment="php-bcmath is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821091" version="1" comment="php-cli is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821092" version="1" comment="php-common is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821093" version="1" comment="php-dba is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821094" version="1" comment="php-devel is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821095" version="1" comment="php-embedded is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821096" version="1" comment="php-enchant is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821097" version="1" comment="php-fpm is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821098" version="1" comment="php-gd is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821099" version="1" comment="php-intl is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821100" version="1" comment="php-ldap is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821101" version="1" comment="php-mbstring is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821102" version="1" comment="php-mysql is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821103" version="1" comment="php-mysqlnd is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821104" version="1" comment="php-odbc is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821105" version="1" comment="php-pdo is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821106" version="1" comment="php-pgsql is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821107" version="1" comment="php-process is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821108" version="1" comment="php-pspell is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821109" version="1" comment="php-recode is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821110" version="1" comment="php-snmp is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821111" version="1" comment="php-soap is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821112" version="1" comment="php-xml is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821113" version="1" comment="php-xmlrpc is &lt;5.4.16-36.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821114" version="1" comment="kernel is &lt;3.10.0-229.7.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821115" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-229.7.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821116" version="1" comment="kernel-debug is &lt;3.10.0-229.7.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821119" version="1" comment="kernel-doc is &lt;3.10.0-229.7.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821120" version="1" comment="kernel-headers is &lt;3.10.0-229.7.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821121" version="1" comment="kernel-tools is &lt;3.10.0-229.7.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821122" version="1" comment="kernel-tools-libs is &lt;3.10.0-229.7.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821124" version="1" comment="perf is &lt;3.10.0-229.7.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821125" version="1" comment="python-perf is &lt;3.10.0-229.7.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821126" version="1" comment="mailman is &lt;2.1.15-21.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821127" version="1" comment="libreswan is &lt;3.12-10.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821128" version="1" comment="nss is &lt;3.19.1-3.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821129" version="1" comment="nss-devel is &lt;3.19.1-3.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821130" version="1" comment="nss-pkcs11-devel is &lt;3.19.1-3.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821131" version="1" comment="nss-sysinit is &lt;3.19.1-3.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821132" version="1" comment="nss-tools is &lt;3.19.1-3.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821133" version="1" comment="nss-util is &lt;3.19.1-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821134" version="1" comment="nss-util-devel is &lt;3.19.1-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821135" version="1" comment="xerces-c is &lt;3.1.1-7.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821136" version="1" comment="xerces-c-devel is &lt;3.1.1-7.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821137" version="1" comment="xerces-c-doc is &lt;3.1.1-7.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821138" version="1" comment="postgresql is &lt;9.2.13-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821139" version="1" comment="postgresql-contrib is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821140" version="1" comment="postgresql-devel is &lt;9.2.13-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821141" version="1" comment="postgresql-docs is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821142" version="1" comment="postgresql-libs is &lt;9.2.13-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821143" version="1" comment="postgresql-plperl is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821144" version="1" comment="postgresql-plpython is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821145" version="1" comment="postgresql-pltcl is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821146" version="1" comment="postgresql-server is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821147" version="1" comment="postgresql-test is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821148" version="1" comment="postgresql-upgrade is &lt;9.2.13-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821149" version="1" comment="firefox is &lt;38.1.0-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821150" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.51-1.b16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821151" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.51-1.b16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821152" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.51-1.b16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821153" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.51-1.b16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821154" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.51-1.b16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821155" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.51-1.b16.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821156" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.51-1.b16.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821157" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.85-2.6.1.2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821158" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.85-2.6.1.2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821159" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.85-2.6.1.2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821160" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.85-2.6.1.2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821161" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.85-2.6.1.2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821162" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.85-2.6.1.2.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821163" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.85-2.6.1.2.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821164" version="1" comment="bind is &lt;9.9.4-18.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821165" version="1" comment="bind-chroot is &lt;9.9.4-18.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821166" version="1" comment="bind-devel is &lt;9.9.4-18.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821167" version="1" comment="bind-libs is &lt;9.9.4-18.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821168" version="1" comment="bind-libs-lite is &lt;9.9.4-18.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821169" version="1" comment="bind-license is &lt;9.9.4-18.el7_1.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821170" version="1" comment="bind-lite-devel is &lt;9.9.4-18.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821171" version="1" comment="bind-sdb is &lt;9.9.4-18.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821172" version="1" comment="bind-sdb-chroot is &lt;9.9.4-18.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821173" version="1" comment="bind-utils is &lt;9.9.4-18.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821174" version="1" comment="thunderbird is &lt;31.8.0-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821175" version="1" comment="libuser is &lt;0.60-7.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821176" version="1" comment="libuser-devel is &lt;0.60-7.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821177" version="1" comment="libuser-python is &lt;0.60-7.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821178" version="1" comment="libcacard is &lt;1.5.3-86.el7_1.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821179" version="1" comment="libcacard-devel is &lt;1.5.3-86.el7_1.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821180" version="1" comment="libcacard-tools is &lt;1.5.3-86.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821181" version="1" comment="qemu-img is &lt;1.5.3-86.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821182" version="1" comment="qemu-kvm is &lt;1.5.3-86.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821183" version="1" comment="qemu-kvm-common is &lt;1.5.3-86.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821184" version="1" comment="qemu-kvm-tools is &lt;1.5.3-86.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821185" version="1" comment="clutter is &lt;1.14.4-12.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821186" version="1" comment="clutter-devel is &lt;1.14.4-12.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821187" version="1" comment="clutter-doc is &lt;1.14.4-12.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821188" version="1" comment="bind is &lt;9.9.4-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821189" version="1" comment="bind-chroot is &lt;9.9.4-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821190" version="1" comment="bind-devel is &lt;9.9.4-18.el7_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821191" version="1" comment="bind-libs is &lt;9.9.4-18.el7_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821192" version="1" comment="bind-libs-lite is &lt;9.9.4-18.el7_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821193" version="1" comment="bind-license is &lt;9.9.4-18.el7_1.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821194" version="1" comment="bind-lite-devel is &lt;9.9.4-18.el7_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821195" version="1" comment="bind-sdb is &lt;9.9.4-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821196" version="1" comment="bind-sdb-chroot is &lt;9.9.4-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821197" version="1" comment="bind-utils is &lt;9.9.4-18.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821198" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.36-1.13.8.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821199" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.36-1.13.8.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821200" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.36-1.13.8.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821201" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.36-1.13.8.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821202" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.36-1.13.8.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821203" version="1" comment="kernel is &lt;3.10.0-229.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821204" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-229.11.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821205" version="1" comment="kernel-debug is &lt;3.10.0-229.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821208" version="1" comment="kernel-doc is &lt;3.10.0-229.11.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821209" version="1" comment="kernel-headers is &lt;3.10.0-229.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821210" version="1" comment="kernel-tools is &lt;3.10.0-229.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821211" version="1" comment="kernel-tools-libs is &lt;3.10.0-229.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821213" version="1" comment="perf is &lt;3.10.0-229.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821214" version="1" comment="python-perf is &lt;3.10.0-229.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821215" version="1" comment="firefox is &lt;38.1.1-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821216" version="1" comment="firefox is &lt;38.2.0-4.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821217" version="1" comment="lemon is &lt;3.7.17-6.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821218" version="1" comment="sqlite is &lt;3.7.17-6.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821219" version="1" comment="sqlite-devel is &lt;3.7.17-6.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821220" version="1" comment="sqlite-doc is &lt;3.7.17-6.el7_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821221" version="1" comment="sqlite-tcl is &lt;3.7.17-6.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821222" version="1" comment="net-snmp is &lt;5.7.2-20.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821223" version="1" comment="net-snmp-agent-libs is &lt;5.7.2-20.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821224" version="1" comment="net-snmp-devel is &lt;5.7.2-20.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821225" version="1" comment="net-snmp-gui is &lt;5.7.2-20.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821226" version="1" comment="net-snmp-libs is &lt;5.7.2-20.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821227" version="1" comment="net-snmp-perl is &lt;5.7.2-20.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821228" version="1" comment="net-snmp-python is &lt;5.7.2-20.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821229" version="1" comment="net-snmp-sysvinit is &lt;5.7.2-20.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821230" version="1" comment="net-snmp-utils is &lt;5.7.2-20.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821231" version="1" comment="pam is &lt;1.1.8-12.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821232" version="1" comment="pam-devel is &lt;1.1.8-12.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821233" version="1" comment="mariadb is &lt;5.5.44-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821234" version="1" comment="mariadb-bench is &lt;5.5.44-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821235" version="1" comment="mariadb-devel is &lt;5.5.44-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821236" version="1" comment="mariadb-embedded is &lt;5.5.44-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821237" version="1" comment="mariadb-embedded-devel is &lt;5.5.44-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821238" version="1" comment="mariadb-libs is &lt;5.5.44-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821239" version="1" comment="mariadb-server is &lt;5.5.44-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821240" version="1" comment="mariadb-test is &lt;5.5.44-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821241" version="1" comment="httpd is &lt;2.4.6-31.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821242" version="1" comment="httpd-devel is &lt;2.4.6-31.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821243" version="1" comment="httpd-manual is &lt;2.4.6-31.el7_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821244" version="1" comment="httpd-tools is &lt;2.4.6-31.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821245" version="1" comment="mod_ldap is &lt;2.4.6-31.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821246" version="1" comment="mod_proxy_html is &lt;2.4.6-31.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821247" version="1" comment="mod_session is &lt;2.4.6-31.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821248" version="1" comment="mod_ssl is &lt;2.4.6-31.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821249" version="1" comment="thunderbird is &lt;38.2.0-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821250" version="1" comment="firefox is &lt;38.2.1-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821251" version="1" comment="gdk-pixbuf2 is &lt;2.28.2-5.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821252" version="1" comment="gdk-pixbuf2-devel is &lt;2.28.2-5.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821253" version="1" comment="jakarta-taglibs-standard is &lt;1.1.2-14.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821254" version="1" comment="jakarta-taglibs-standard-javadoc is &lt;1.1.2-14.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821255" version="1" comment="nss-softokn is &lt;3.16.2.3-13.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821256" version="1" comment="nss-softokn-devel is &lt;3.16.2.3-13.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821257" version="1" comment="nss-softokn-freebl is &lt;3.16.2.3-13.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821258" version="1" comment="nss-softokn-freebl-devel is &lt;3.16.2.3-13.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821259" version="1" comment="pcs is &lt;0.9.137-13.el7_1.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821260" version="1" comment="python-clufter is &lt;0.9.137-13.el7_1.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821261" version="1" comment="bind is &lt;9.9.4-18.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821262" version="1" comment="bind-chroot is &lt;9.9.4-18.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821263" version="1" comment="bind-devel is &lt;9.9.4-18.el7_1.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821264" version="1" comment="bind-libs is &lt;9.9.4-18.el7_1.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821265" version="1" comment="bind-libs-lite is &lt;9.9.4-18.el7_1.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821266" version="1" comment="bind-license is &lt;9.9.4-18.el7_1.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821267" version="1" comment="bind-lite-devel is &lt;9.9.4-18.el7_1.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821268" version="1" comment="bind-sdb is &lt;9.9.4-18.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821269" version="1" comment="bind-sdb-chroot is &lt;9.9.4-18.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821270" version="1" comment="bind-utils is &lt;9.9.4-18.el7_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821271" version="1" comment="libXfont is &lt;1.4.7-3.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821272" version="1" comment="libXfont-devel is &lt;1.4.7-3.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821273" version="1" comment="spice-server is &lt;0.12.4-9.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821274" version="1" comment="spice-server-devel is &lt;0.12.4-9.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821275" version="1" comment="haproxy is &lt;1.5.4-4.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821276" version="1" comment="mod_dav_svn is &lt;1.7.14-7.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821277" version="1" comment="subversion is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821278" version="1" comment="subversion-devel is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821279" version="1" comment="subversion-gnome is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821280" version="1" comment="subversion-javahl is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821281" version="1" comment="subversion-kde is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821282" version="1" comment="subversion-libs is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821283" version="1" comment="subversion-perl is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821284" version="1" comment="subversion-python is &lt;1.7.14-7.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821285" version="1" comment="subversion-ruby is &lt;1.7.14-7.el7_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821286" version="1" comment="subversion-tools is &lt;1.7.14-7.el7_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821287" version="1" comment="kernel is &lt;3.10.0-229.14.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821288" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-229.14.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821289" version="1" comment="kernel-debug is &lt;3.10.0-229.14.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821292" version="1" comment="kernel-doc is &lt;3.10.0-229.14.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821293" version="1" comment="kernel-headers is &lt;3.10.0-229.14.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821294" version="1" comment="kernel-tools is &lt;3.10.0-229.14.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821295" version="1" comment="kernel-tools-libs is &lt;3.10.0-229.14.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821297" version="1" comment="perf is &lt;3.10.0-229.14.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821298" version="1" comment="python-perf is &lt;3.10.0-229.14.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821299" version="1" comment="libcacard is &lt;1.5.3-86.el7_1.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821300" version="1" comment="libcacard-devel is &lt;1.5.3-86.el7_1.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821301" version="1" comment="libcacard-tools is &lt;1.5.3-86.el7_1.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821302" version="1" comment="qemu-img is &lt;1.5.3-86.el7_1.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821303" version="1" comment="qemu-kvm is &lt;1.5.3-86.el7_1.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821304" version="1" comment="qemu-kvm-common is &lt;1.5.3-86.el7_1.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821305" version="1" comment="qemu-kvm-tools is &lt;1.5.3-86.el7_1.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821306" version="1" comment="firefox is &lt;38.3.0-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821307" version="1" comment="openldap is &lt;2.4.39-7.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821308" version="1" comment="openldap-clients is &lt;2.4.39-7.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821309" version="1" comment="openldap-devel is &lt;2.4.39-7.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821310" version="1" comment="openldap-servers is &lt;2.4.39-7.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821311" version="1" comment="openldap-servers-sql is &lt;2.4.39-7.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821312" version="1" comment="thunderbird is &lt;38.3.0-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821313" version="1" comment="spice-server is &lt;0.12.4-9.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821314" version="1" comment="spice-server-devel is &lt;0.12.4-9.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821315" version="1" comment="libwmf is &lt;0.2.8.4-41.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821316" version="1" comment="libwmf-devel is &lt;0.2.8.4-41.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821317" version="1" comment="libwmf-lite is &lt;0.2.8.4-41.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821318" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.65-2.b17.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821319" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.65-2.b17.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821320" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.65-2.b17.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821321" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.65-2.b17.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821322" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.65-2.b17.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821323" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.65-2.b17.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821324" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.65-2.b17.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821325" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.91-2.6.2.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821326" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.91-2.6.2.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821327" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.91-2.6.2.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821328" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.91-2.6.2.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821329" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.91-2.6.2.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821330" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.91-2.6.2.1.el7_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821331" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.91-2.6.2.1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821332" version="1" comment="ntp is &lt;4.2.6p5-19.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821333" version="1" comment="ntp-doc is &lt;4.2.6p5-19.el7_1.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821334" version="1" comment="ntp-perl is &lt;4.2.6p5-19.el7_1.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821335" version="1" comment="ntpdate is &lt;4.2.6p5-19.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821336" version="1" comment="sntp is &lt;4.2.6p5-19.el7_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821337" version="1" comment="libcacard is &lt;1.5.3-86.el7_1.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821338" version="1" comment="libcacard-devel is &lt;1.5.3-86.el7_1.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821339" version="1" comment="libcacard-tools is &lt;1.5.3-86.el7_1.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821340" version="1" comment="qemu-img is &lt;1.5.3-86.el7_1.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821341" version="1" comment="qemu-kvm is &lt;1.5.3-86.el7_1.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821342" version="1" comment="qemu-kvm-common is &lt;1.5.3-86.el7_1.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821343" version="1" comment="qemu-kvm-tools is &lt;1.5.3-86.el7_1.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821344" version="1" comment="kernel is &lt;3.10.0-229.20.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821345" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-229.20.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821346" version="1" comment="kernel-debug is &lt;3.10.0-229.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821349" version="1" comment="kernel-doc is &lt;3.10.0-229.20.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821350" version="1" comment="kernel-headers is &lt;3.10.0-229.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821351" version="1" comment="kernel-tools is &lt;3.10.0-229.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821352" version="1" comment="kernel-tools-libs is &lt;3.10.0-229.20.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821354" version="1" comment="perf is &lt;3.10.0-229.20.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821355" version="1" comment="python-perf is &lt;3.10.0-229.20.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821356" version="1" comment="libreswan is &lt;3.15-5.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821357" version="1" comment="nspr is &lt;4.10.8-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821358" version="1" comment="nspr-devel is &lt;4.10.8-2.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821359" version="1" comment="nss is &lt;3.19.1-7.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821360" version="1" comment="nss-devel is &lt;3.19.1-7.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821361" version="1" comment="nss-pkcs11-devel is &lt;3.19.1-7.el7_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821362" version="1" comment="nss-sysinit is &lt;3.19.1-7.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821363" version="1" comment="nss-tools is &lt;3.19.1-7.el7_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821364" version="1" comment="nss-util is &lt;3.19.1-4.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821365" version="1" comment="nss-util-devel is &lt;3.19.1-4.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821366" version="1" comment="firefox is &lt;38.4.0-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821367" version="1" comment="postgresql is &lt;9.2.14-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821368" version="1" comment="postgresql-contrib is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821369" version="1" comment="postgresql-devel is &lt;9.2.14-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821370" version="1" comment="postgresql-docs is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821371" version="1" comment="postgresql-libs is &lt;9.2.14-1.el7_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821372" version="1" comment="postgresql-plperl is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821373" version="1" comment="postgresql-plpython is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821374" version="1" comment="postgresql-pltcl is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821375" version="1" comment="postgresql-server is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821376" version="1" comment="postgresql-test is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821377" version="1" comment="postgresql-upgrade is &lt;9.2.14-1.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821378" version="1" comment="binutils is &lt;2.23.52.0.1-55.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821379" version="1" comment="binutils-devel is &lt;2.23.52.0.1-55.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821380" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.37-1.13.9.4.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821381" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.37-1.13.9.4.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821382" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.37-1.13.9.4.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821383" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.37-1.13.9.4.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821384" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.37-1.13.9.4.el7_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821385" version="1" comment="openssh is &lt;6.6.1p1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821386" version="1" comment="openssh-askpass is &lt;6.6.1p1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821387" version="1" comment="openssh-clients is &lt;6.6.1p1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821388" version="1" comment="openssh-keycat is &lt;6.6.1p1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821389" version="1" comment="openssh-ldap is &lt;6.6.1p1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821390" version="1" comment="openssh-server is &lt;6.6.1p1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821391" version="1" comment="openssh-server-sysvinit is &lt;6.6.1p1-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821392" version="1" comment="pam_ssh_agent_auth is &lt;0.9.3-9.22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821393" version="1" comment="python is &lt;2.7.5-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821394" version="1" comment="python-debug is &lt;2.7.5-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821395" version="1" comment="python-devel is &lt;2.7.5-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821396" version="1" comment="python-libs is &lt;2.7.5-34.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821397" version="1" comment="python-test is &lt;2.7.5-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821398" version="1" comment="python-tools is &lt;2.7.5-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821399" version="1" comment="tkinter is &lt;2.7.5-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821400" version="1" comment="cpio is &lt;2.11-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821401" version="1" comment="grep is &lt;2.20-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821402" version="1" comment="openldap is &lt;2.4.40-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821403" version="1" comment="openldap-clients is &lt;2.4.40-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821404" version="1" comment="openldap-devel is &lt;2.4.40-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821405" version="1" comment="openldap-servers is &lt;2.4.40-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821406" version="1" comment="openldap-servers-sql is &lt;2.4.40-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821407" version="1" comment="libssh2 is &lt;1.4.3-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821408" version="1" comment="libssh2-devel is &lt;1.4.3-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821409" version="1" comment="libssh2-docs is &lt;1.4.3-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821410" version="1" comment="xfsprogs is &lt;3.2.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821411" version="1" comment="xfsprogs-devel is &lt;3.2.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821412" version="1" comment="xfsprogs-qa-devel is &lt;3.2.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821413" version="1" comment="kernel is &lt;3.10.0-327.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821414" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821415" version="1" comment="kernel-debug is &lt;3.10.0-327.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821418" version="1" comment="kernel-doc is &lt;3.10.0-327.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821419" version="1" comment="kernel-headers is &lt;3.10.0-327.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821420" version="1" comment="kernel-tools is &lt;3.10.0-327.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821421" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821423" version="1" comment="perf is &lt;3.10.0-327.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821424" version="1" comment="python-perf is &lt;3.10.0-327.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821425" version="1" comment="krb5-devel is &lt;1.13.2-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821426" version="1" comment="krb5-libs is &lt;1.13.2-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821427" version="1" comment="krb5-pkinit is &lt;1.13.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821428" version="1" comment="krb5-server is &lt;1.13.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821429" version="1" comment="krb5-server-ldap is &lt;1.13.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821430" version="1" comment="krb5-workstation is &lt;1.13.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821431" version="1" comment="file is &lt;5.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821432" version="1" comment="file-devel is &lt;5.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821433" version="1" comment="file-libs is &lt;5.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821434" version="1" comment="file-static is &lt;5.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821435" version="1" comment="python-magic is &lt;5.11-31.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821436" version="1" comment="curl is &lt;7.29.0-25.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821437" version="1" comment="libcurl is &lt;7.29.0-25.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821438" version="1" comment="libcurl-devel is &lt;7.29.0-25.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821439" version="1" comment="glibc is &lt;2.17-106.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821440" version="1" comment="glibc-common is &lt;2.17-106.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821441" version="1" comment="glibc-devel is &lt;2.17-106.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821442" version="1" comment="glibc-headers is &lt;2.17-106.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821443" version="1" comment="glibc-static is &lt;2.17-106.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821444" version="1" comment="glibc-utils is &lt;2.17-106.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821445" version="1" comment="nscd is &lt;2.17-106.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821446" version="1" comment="rubygem-bundler is &lt;1.7.8-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821447" version="1" comment="rubygem-bundler-doc is &lt;1.7.8-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821448" version="1" comment="rubygem-thor is &lt;0.19.1-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821449" version="1" comment="rubygem-thor-doc is &lt;0.19.1-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821450" version="1" comment="realmd is &lt;0.16.1-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821451" version="1" comment="realmd-devel-docs is &lt;0.16.1-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821452" version="1" comment="glibc is &lt;2.17-105.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821453" version="1" comment="glibc-common is &lt;2.17-105.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821454" version="1" comment="glibc-devel is &lt;2.17-105.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821455" version="1" comment="glibc-headers is &lt;2.17-105.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821456" version="1" comment="glibc-static is &lt;2.17-105.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821457" version="1" comment="glibc-utils is &lt;2.17-105.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821458" version="1" comment="nscd is &lt;2.17-105.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821459" version="1" comment="ntp is &lt;4.2.6p5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821460" version="1" comment="ntp-doc is &lt;4.2.6p5-22.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821461" version="1" comment="ntp-perl is &lt;4.2.6p5-22.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821462" version="1" comment="ntpdate is &lt;4.2.6p5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821463" version="1" comment="sntp is &lt;4.2.6p5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821464" version="1" comment="tigervnc is &lt;1.3.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821465" version="1" comment="tigervnc-icons is &lt;1.3.1-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821466" version="1" comment="tigervnc-license is &lt;1.3.1-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821467" version="1" comment="tigervnc-server is &lt;1.3.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821468" version="1" comment="tigervnc-server-applet is &lt;1.3.1-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821469" version="1" comment="tigervnc-server-minimal is &lt;1.3.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821470" version="1" comment="tigervnc-server-module is &lt;1.3.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821471" version="1" comment="rest is &lt;0.7.92-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821472" version="1" comment="rest-devel is &lt;0.7.92-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821473" version="1" comment="chrony is &lt;2.1.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821474" version="1" comment="netcf is &lt;0.2.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821475" version="1" comment="netcf-devel is &lt;0.2.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821476" version="1" comment="netcf-libs is &lt;0.2.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821477" version="1" comment="pcs is &lt;0.9.143-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821478" version="1" comment="ModemManager is &lt;1.1.0-8.git20130913.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821479" version="1" comment="ModemManager-devel is &lt;1.1.0-8.git20130913.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821480" version="1" comment="ModemManager-glib is &lt;1.1.0-8.git20130913.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821481" version="1" comment="ModemManager-glib-devel is &lt;1.1.0-8.git20130913.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821482" version="1" comment="ModemManager-vala is &lt;1.1.0-8.git20130913.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821483" version="1" comment="NetworkManager is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821484" version="1" comment="NetworkManager-adsl is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821485" version="1" comment="NetworkManager-bluetooth is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821486" version="1" comment="NetworkManager-config-routing-rules is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821487" version="1" comment="NetworkManager-config-server is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821488" version="1" comment="NetworkManager-devel is &lt;1.0.6-27.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821489" version="1" comment="NetworkManager-glib is &lt;1.0.6-27.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821490" version="1" comment="NetworkManager-glib-devel is &lt;1.0.6-27.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821491" version="1" comment="NetworkManager-libnm is &lt;1.0.6-27.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821492" version="1" comment="NetworkManager-libnm-devel is &lt;1.0.6-27.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821493" version="1" comment="NetworkManager-libreswan is &lt;1.0.6-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821494" version="1" comment="NetworkManager-libreswan-gnome is &lt;1.0.6-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821495" version="1" comment="NetworkManager-team is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821496" version="1" comment="NetworkManager-tui is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821497" version="1" comment="NetworkManager-wifi is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821498" version="1" comment="NetworkManager-wwan is &lt;1.0.6-27.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821499" version="1" comment="libnm-gtk is &lt;1.0.6-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821500" version="1" comment="libnm-gtk-devel is &lt;1.0.6-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821501" version="1" comment="network-manager-applet is &lt;1.0.6-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821502" version="1" comment="nm-connection-editor is &lt;1.0.6-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821503" version="1" comment="net-snmp is &lt;5.7.2-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821504" version="1" comment="net-snmp-agent-libs is &lt;5.7.2-24.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821505" version="1" comment="net-snmp-devel is &lt;5.7.2-24.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821506" version="1" comment="net-snmp-gui is &lt;5.7.2-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821507" version="1" comment="net-snmp-libs is &lt;5.7.2-24.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821508" version="1" comment="net-snmp-perl is &lt;5.7.2-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821509" version="1" comment="net-snmp-python is &lt;5.7.2-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821510" version="1" comment="net-snmp-sysvinit is &lt;5.7.2-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821511" version="1" comment="net-snmp-utils is &lt;5.7.2-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821512" version="1" comment="libipa_hbac is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821513" version="1" comment="libipa_hbac-devel is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821514" version="1" comment="libsss_idmap is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821515" version="1" comment="libsss_idmap-devel is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821516" version="1" comment="libsss_nss_idmap is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821517" version="1" comment="libsss_nss_idmap-devel is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821518" version="1" comment="libsss_simpleifp is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821519" version="1" comment="libsss_simpleifp-devel is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821520" version="1" comment="python-libipa_hbac is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821521" version="1" comment="python-libsss_nss_idmap is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821522" version="1" comment="python-sss is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821523" version="1" comment="python-sss-murmur is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821524" version="1" comment="python-sssdconfig is &lt;1.13.0-40.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821525" version="1" comment="sssd is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821526" version="1" comment="sssd-ad is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821527" version="1" comment="sssd-client is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821528" version="1" comment="sssd-common is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821529" version="1" comment="sssd-common-pac is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821530" version="1" comment="sssd-dbus is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821531" version="1" comment="sssd-ipa is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821532" version="1" comment="sssd-krb5 is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821533" version="1" comment="sssd-krb5-common is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821534" version="1" comment="sssd-ldap is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821535" version="1" comment="sssd-libwbclient is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821536" version="1" comment="sssd-libwbclient-devel is &lt;1.13.0-40.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821537" version="1" comment="sssd-proxy is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821538" version="1" comment="sssd-tools is &lt;1.13.0-40.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821539" version="1" comment="cups-filters is &lt;1.0.35-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821540" version="1" comment="cups-filters-devel is &lt;1.0.35-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821541" version="1" comment="cups-filters-libs is &lt;1.0.35-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821542" version="1" comment="openhpi is &lt;3.4.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821543" version="1" comment="openhpi-devel is &lt;3.4.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821544" version="1" comment="openhpi-libs is &lt;3.4.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821545" version="1" comment="squid is &lt;3.3.8-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821546" version="1" comment="squid-sysvinit is &lt;3.3.8-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821547" version="1" comment="pacemaker is &lt;1.1.13-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821548" version="1" comment="pacemaker-cli is &lt;1.1.13-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821549" version="1" comment="pacemaker-cluster-libs is &lt;1.1.13-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821550" version="1" comment="pacemaker-cts is &lt;1.1.13-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821551" version="1" comment="pacemaker-doc is &lt;1.1.13-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821552" version="1" comment="pacemaker-libs is &lt;1.1.13-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821553" version="1" comment="pacemaker-libs-devel is &lt;1.1.13-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821554" version="1" comment="pacemaker-nagios-plugins-metadata is &lt;1.1.13-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821555" version="1" comment="pacemaker-remote is &lt;1.1.13-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821556" version="1" comment="wireshark is &lt;1.10.14-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821557" version="1" comment="wireshark-devel is &lt;1.10.14-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821558" version="1" comment="wireshark-gnome is &lt;1.10.14-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821559" version="1" comment="grub2 is &lt;2.02-0.29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821560" version="1" comment="grub2-efi is &lt;2.02-0.29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821561" version="1" comment="grub2-efi-modules is &lt;2.02-0.29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821562" version="1" comment="grub2-tools is &lt;2.02-0.29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821563" version="1" comment="autofs is &lt;5.0.7-54.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821564" version="1" comment="unbound is &lt;1.4.20-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821565" version="1" comment="unbound-devel is &lt;1.4.20-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821566" version="1" comment="unbound-libs is &lt;1.4.20-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821567" version="1" comment="unbound-python is &lt;1.4.20-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821568" version="1" comment="abrt is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821569" version="1" comment="abrt-addon-ccpp is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821570" version="1" comment="abrt-addon-kerneloops is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821571" version="1" comment="abrt-addon-pstoreoops is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821572" version="1" comment="abrt-addon-python is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821573" version="1" comment="abrt-addon-upload-watch is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821574" version="1" comment="abrt-addon-vmcore is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821575" version="1" comment="abrt-addon-xorg is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821576" version="1" comment="abrt-cli is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821577" version="1" comment="abrt-console-notification is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821578" version="1" comment="abrt-dbus is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821579" version="1" comment="abrt-desktop is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821580" version="1" comment="abrt-devel is &lt;2.1.11-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821581" version="1" comment="abrt-gui is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821582" version="1" comment="abrt-gui-devel is &lt;2.1.11-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821583" version="1" comment="abrt-gui-libs is &lt;2.1.11-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821584" version="1" comment="abrt-libs is &lt;2.1.11-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821585" version="1" comment="abrt-python is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821586" version="1" comment="abrt-python-doc is &lt;2.1.11-35.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821587" version="1" comment="abrt-retrace-client is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821588" version="1" comment="abrt-tui is &lt;2.1.11-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821589" version="1" comment="libreport is &lt;2.1.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821590" version="1" comment="libreport-anaconda is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821591" version="1" comment="libreport-cli is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821592" version="1" comment="libreport-compat is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821593" version="1" comment="libreport-devel is &lt;2.1.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821594" version="1" comment="libreport-filesystem is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821595" version="1" comment="libreport-gtk is &lt;2.1.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821596" version="1" comment="libreport-gtk-devel is &lt;2.1.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821597" version="1" comment="libreport-newt is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821598" version="1" comment="libreport-plugin-bugzilla is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821599" version="1" comment="libreport-plugin-kerneloops is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821600" version="1" comment="libreport-plugin-logger is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821601" version="1" comment="libreport-plugin-mailx is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821602" version="1" comment="libreport-plugin-reportuploader is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821603" version="1" comment="libreport-python is &lt;2.1.11-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821604" version="1" comment="libreport-web is &lt;2.1.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821605" version="1" comment="libreport-web-devel is &lt;2.1.11-31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821606" version="1" comment="thunderbird is &lt;38.4.0-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821607" version="1" comment="apache-commons-collections is &lt;3.2.1-22.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821608" version="1" comment="apache-commons-collections-javadoc is &lt;3.2.1-22.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821609" version="1" comment="apache-commons-collections-testframework is &lt;3.2.1-22.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821610" version="1" comment="apache-commons-collections-testframework-javadoc is &lt;3.2.1-22.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821611" version="1" comment="libxml2 is &lt;2.9.1-6.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821612" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821613" version="1" comment="libxml2-python is &lt;2.9.1-6.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821614" version="1" comment="libxml2-static is &lt;2.9.1-6.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821615" version="1" comment="kernel is &lt;3.10.0-327.3.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821616" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.3.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821617" version="1" comment="kernel-debug is &lt;3.10.0-327.3.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821620" version="1" comment="kernel-doc is &lt;3.10.0-327.3.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821621" version="1" comment="kernel-headers is &lt;3.10.0-327.3.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821622" version="1" comment="kernel-tools is &lt;3.10.0-327.3.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821623" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.3.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821625" version="1" comment="perf is &lt;3.10.0-327.3.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821626" version="1" comment="python-perf is &lt;3.10.0-327.3.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821627" version="1" comment="emacs-git is &lt;1.8.3.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821628" version="1" comment="emacs-git-el is &lt;1.8.3.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821629" version="1" comment="git is &lt;1.8.3.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821630" version="1" comment="git-all is &lt;1.8.3.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821631" version="1" comment="git-bzr is &lt;1.8.3.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821632" version="1" comment="git-cvs is &lt;1.8.3.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821633" version="1" comment="git-daemon is &lt;1.8.3.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821634" version="1" comment="git-email is &lt;1.8.3.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821635" version="1" comment="git-gui is &lt;1.8.3.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821636" version="1" comment="git-hg is &lt;1.8.3.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821637" version="1" comment="git-p4 is &lt;1.8.3.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821638" version="1" comment="git-svn is &lt;1.8.3.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821639" version="1" comment="gitk is &lt;1.8.3.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821640" version="1" comment="gitweb is &lt;1.8.3.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821641" version="1" comment="perl-Git is &lt;1.8.3.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821642" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821643" version="1" comment="libpng12 is &lt;1.2.50-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821644" version="1" comment="libpng12-devel is &lt;1.2.50-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821645" version="1" comment="libpng is &lt;1.5.13-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821646" version="1" comment="libpng-devel is &lt;1.5.13-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821647" version="1" comment="libpng-static is &lt;1.5.13-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821648" version="1" comment="openssl is &lt;1.0.1e-51.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821649" version="1" comment="openssl-devel is &lt;1.0.1e-51.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821650" version="1" comment="openssl-libs is &lt;1.0.1e-51.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821651" version="1" comment="openssl-perl is &lt;1.0.1e-51.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821652" version="1" comment="openssl-static is &lt;1.0.1e-51.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821653" version="1" comment="grub2 is &lt;2.02-0.33.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821654" version="1" comment="grub2-efi is &lt;2.02-0.33.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821655" version="1" comment="grub2-efi-modules is &lt;2.02-0.33.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821656" version="1" comment="grub2-tools is &lt;2.02-0.33.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821657" version="1" comment="bind is &lt;9.9.4-29.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821658" version="1" comment="bind-chroot is &lt;9.9.4-29.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821659" version="1" comment="bind-devel is &lt;9.9.4-29.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821660" version="1" comment="bind-libs is &lt;9.9.4-29.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821661" version="1" comment="bind-libs-lite is &lt;9.9.4-29.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821662" version="1" comment="bind-license is &lt;9.9.4-29.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821663" version="1" comment="bind-lite-devel is &lt;9.9.4-29.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821664" version="1" comment="bind-pkcs11 is &lt;9.9.4-29.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821665" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-29.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821666" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-29.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821667" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-29.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821668" version="1" comment="bind-sdb is &lt;9.9.4-29.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821669" version="1" comment="bind-sdb-chroot is &lt;9.9.4-29.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821670" version="1" comment="bind-utils is &lt;9.9.4-29.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821671" version="1" comment="firefox is &lt;38.5.0-3.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821672" version="1" comment="thunderbird is &lt;38.5.0-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821673" version="1" comment="rpcbind is &lt;0.2.0-33.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821674" version="1" comment="ctdb is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821675" version="1" comment="ctdb-devel is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821676" version="1" comment="ctdb-tests is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821677" version="1" comment="libsmbclient is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821678" version="1" comment="libsmbclient-devel is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821679" version="1" comment="libwbclient is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821680" version="1" comment="libwbclient-devel is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821681" version="1" comment="samba is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821682" version="1" comment="samba-client is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821683" version="1" comment="samba-client-libs is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821684" version="1" comment="samba-common is &lt;4.2.3-11.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821685" version="1" comment="samba-common-libs is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821686" version="1" comment="samba-common-tools is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821687" version="1" comment="samba-dc is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821688" version="1" comment="samba-dc-libs is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821689" version="1" comment="samba-devel is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821690" version="1" comment="samba-libs is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821691" version="1" comment="samba-pidl is &lt;4.2.3-11.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821692" version="1" comment="samba-python is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821693" version="1" comment="samba-test is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821694" version="1" comment="samba-test-devel is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821695" version="1" comment="samba-test-libs is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821696" version="1" comment="samba-vfs-glusterfs is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821697" version="1" comment="samba-winbind is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821698" version="1" comment="samba-winbind-clients is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821699" version="1" comment="samba-winbind-krb5-locator is &lt;4.2.3-11.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821700" version="1" comment="samba-winbind-modules is &lt;4.2.3-11.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821701" version="1" comment="nss is &lt;3.19.1-19.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821702" version="1" comment="nss-devel is &lt;3.19.1-19.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821703" version="1" comment="nss-pkcs11-devel is &lt;3.19.1-19.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821704" version="1" comment="nss-sysinit is &lt;3.19.1-19.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821705" version="1" comment="nss-tools is &lt;3.19.1-19.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821706" version="1" comment="openssl is &lt;1.0.1e-51.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821707" version="1" comment="openssl-devel is &lt;1.0.1e-51.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821708" version="1" comment="openssl-libs is &lt;1.0.1e-51.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821709" version="1" comment="openssl-perl is &lt;1.0.1e-51.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821710" version="1" comment="openssl-static is &lt;1.0.1e-51.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821711" version="1" comment="ldb-tools is &lt;1.1.20-1.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821712" version="1" comment="libldb is &lt;1.1.20-1.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821713" version="1" comment="libldb-devel is &lt;1.1.20-1.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821714" version="1" comment="pyldb is &lt;1.1.20-1.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821715" version="1" comment="pyldb-devel is &lt;1.1.20-1.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821716" version="1" comment="gnutls is &lt;3.3.8-14.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821717" version="1" comment="gnutls-c++ is &lt;3.3.8-14.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821718" version="1" comment="gnutls-dane is &lt;3.3.8-14.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821719" version="1" comment="gnutls-devel is &lt;3.3.8-14.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821720" version="1" comment="gnutls-utils is &lt;3.3.8-14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821721" version="1" comment="openssh is &lt;6.6.1p1-23.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821722" version="1" comment="openssh-askpass is &lt;6.6.1p1-23.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821723" version="1" comment="openssh-clients is &lt;6.6.1p1-23.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821724" version="1" comment="openssh-keycat is &lt;6.6.1p1-23.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821725" version="1" comment="openssh-ldap is &lt;6.6.1p1-23.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821726" version="1" comment="openssh-server is &lt;6.6.1p1-23.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821727" version="1" comment="openssh-server-sysvinit is &lt;6.6.1p1-23.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821728" version="1" comment="pam_ssh_agent_auth is &lt;0.9.3-9.23.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821729" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821730" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821731" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821732" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821733" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821734" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821735" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821736" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821737" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821738" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821739" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.71-2.b15.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821740" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.71-2.b15.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821741" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821742" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.71-2.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821743" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.95-2.6.4.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821744" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.95-2.6.4.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821745" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.95-2.6.4.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821746" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.95-2.6.4.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821747" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.95-2.6.4.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821748" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.95-2.6.4.0.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821749" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.95-2.6.4.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821750" version="1" comment="ntp is &lt;4.2.6p5-22.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821751" version="1" comment="ntp-doc is &lt;4.2.6p5-22.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821752" version="1" comment="ntp-perl is &lt;4.2.6p5-22.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821753" version="1" comment="ntpdate is &lt;4.2.6p5-22.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821754" version="1" comment="sntp is &lt;4.2.6p5-22.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821755" version="1" comment="kernel is &lt;3.10.0-327.4.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821756" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.4.5.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821757" version="1" comment="kernel-debug is &lt;3.10.0-327.4.5.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821760" version="1" comment="kernel-doc is &lt;3.10.0-327.4.5.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821761" version="1" comment="kernel-headers is &lt;3.10.0-327.4.5.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821762" version="1" comment="kernel-tools is &lt;3.10.0-327.4.5.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821763" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.4.5.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821765" version="1" comment="perf is &lt;3.10.0-327.4.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821766" version="1" comment="python-perf is &lt;3.10.0-327.4.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821767" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.38-1.13.10.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821768" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.38-1.13.10.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821769" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.38-1.13.10.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821770" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.38-1.13.10.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821771" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.38-1.13.10.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821772" version="1" comment="firefox is &lt;38.6.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821773" version="1" comment="bind is &lt;9.9.4-29.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821774" version="1" comment="bind-chroot is &lt;9.9.4-29.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821775" version="1" comment="bind-devel is &lt;9.9.4-29.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821776" version="1" comment="bind-libs is &lt;9.9.4-29.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821777" version="1" comment="bind-libs-lite is &lt;9.9.4-29.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821778" version="1" comment="bind-license is &lt;9.9.4-29.el7_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821779" version="1" comment="bind-lite-devel is &lt;9.9.4-29.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821780" version="1" comment="bind-pkcs11 is &lt;9.9.4-29.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821781" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-29.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821782" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-29.el7_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821783" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-29.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821784" version="1" comment="bind-sdb is &lt;9.9.4-29.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821785" version="1" comment="bind-sdb-chroot is &lt;9.9.4-29.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821786" version="1" comment="bind-utils is &lt;9.9.4-29.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821787" version="1" comment="libcacard is &lt;1.5.3-105.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821788" version="1" comment="libcacard-devel is &lt;1.5.3-105.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821789" version="1" comment="libcacard-tools is &lt;1.5.3-105.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821790" version="1" comment="qemu-img is &lt;1.5.3-105.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821791" version="1" comment="qemu-kvm is &lt;1.5.3-105.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821792" version="1" comment="qemu-kvm-common is &lt;1.5.3-105.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821793" version="1" comment="qemu-kvm-tools is &lt;1.5.3-105.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821794" version="1" comment="glibc is &lt;2.17-106.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821795" version="1" comment="glibc-common is &lt;2.17-106.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821796" version="1" comment="glibc-devel is &lt;2.17-106.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821797" version="1" comment="glibc-headers is &lt;2.17-106.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821798" version="1" comment="glibc-static is &lt;2.17-106.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821799" version="1" comment="glibc-utils is &lt;2.17-106.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821800" version="1" comment="nscd is &lt;2.17-106.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821801" version="1" comment="kernel is &lt;3.10.0-327.10.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821802" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.10.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821803" version="1" comment="kernel-debug is &lt;3.10.0-327.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821806" version="1" comment="kernel-doc is &lt;3.10.0-327.10.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821807" version="1" comment="kernel-headers is &lt;3.10.0-327.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821808" version="1" comment="kernel-tools is &lt;3.10.0-327.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821809" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821811" version="1" comment="perf is &lt;3.10.0-327.10.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821812" version="1" comment="python-perf is &lt;3.10.0-327.10.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821813" version="1" comment="sos is &lt;3.2-35.el7_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821814" version="1" comment="polkit is &lt;0.112-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821815" version="1" comment="polkit-devel is &lt;0.112-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821816" version="1" comment="polkit-docs is &lt;0.112-6.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821817" version="1" comment="firefox is &lt;38.6.1-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821818" version="1" comment="389-ds-base is &lt;1.3.4.0-26.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821819" version="1" comment="389-ds-base-devel is &lt;1.3.4.0-26.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821820" version="1" comment="389-ds-base-libs is &lt;1.3.4.0-26.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821821" version="1" comment="thunderbird is &lt;38.6.0-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821822" version="1" comment="openssl is &lt;1.0.1e-51.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821823" version="1" comment="openssl-devel is &lt;1.0.1e-51.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821824" version="1" comment="openssl-libs is &lt;1.0.1e-51.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821825" version="1" comment="openssl-perl is &lt;1.0.1e-51.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821826" version="1" comment="openssl-static is &lt;1.0.1e-51.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821827" version="1" comment="postgresql is &lt;9.2.15-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821828" version="1" comment="postgresql-contrib is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821829" version="1" comment="postgresql-devel is &lt;9.2.15-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821830" version="1" comment="postgresql-docs is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821831" version="1" comment="postgresql-libs is &lt;9.2.15-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821832" version="1" comment="postgresql-plperl is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821833" version="1" comment="postgresql-plpython is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821834" version="1" comment="postgresql-pltcl is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821835" version="1" comment="postgresql-server is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821836" version="1" comment="postgresql-test is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821837" version="1" comment="postgresql-upgrade is &lt;9.2.15-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821838" version="1" comment="nss-util is &lt;3.19.1-9.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821839" version="1" comment="nss-util-devel is &lt;3.19.1-9.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821840" version="1" comment="openssl098e is &lt;0.9.8e-29.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821841" version="1" comment="firefox is &lt;38.7.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821842" version="1" comment="libssh2 is &lt;1.4.3-10.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821843" version="1" comment="libssh2-devel is &lt;1.4.3-10.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821844" version="1" comment="libssh2-docs is &lt;1.4.3-10.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821845" version="1" comment="xerces-c is &lt;3.1.1-8.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821846" version="1" comment="xerces-c-devel is &lt;3.1.1-8.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821847" version="1" comment="xerces-c-doc is &lt;3.1.1-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821848" version="1" comment="ctdb is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821849" version="1" comment="ctdb-devel is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821850" version="1" comment="ctdb-tests is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821851" version="1" comment="libsmbclient is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821852" version="1" comment="libsmbclient-devel is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821853" version="1" comment="libwbclient is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821854" version="1" comment="libwbclient-devel is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821855" version="1" comment="samba is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821856" version="1" comment="samba-client is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821857" version="1" comment="samba-client-libs is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821858" version="1" comment="samba-common is &lt;4.2.3-12.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821859" version="1" comment="samba-common-libs is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821860" version="1" comment="samba-common-tools is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821861" version="1" comment="samba-dc is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821862" version="1" comment="samba-dc-libs is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821863" version="1" comment="samba-devel is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821864" version="1" comment="samba-libs is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821865" version="1" comment="samba-pidl is &lt;4.2.3-12.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821866" version="1" comment="samba-python is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821867" version="1" comment="samba-test is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821868" version="1" comment="samba-test-devel is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821869" version="1" comment="samba-test-libs is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821870" version="1" comment="samba-vfs-glusterfs is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821871" version="1" comment="samba-winbind is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821872" version="1" comment="samba-winbind-clients is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821873" version="1" comment="samba-winbind-krb5-locator is &lt;4.2.3-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821874" version="1" comment="samba-winbind-modules is &lt;4.2.3-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821875" version="1" comment="bind is &lt;9.9.4-29.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821876" version="1" comment="bind-chroot is &lt;9.9.4-29.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821877" version="1" comment="bind-devel is &lt;9.9.4-29.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821878" version="1" comment="bind-libs is &lt;9.9.4-29.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821879" version="1" comment="bind-libs-lite is &lt;9.9.4-29.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821880" version="1" comment="bind-license is &lt;9.9.4-29.el7_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821881" version="1" comment="bind-lite-devel is &lt;9.9.4-29.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821882" version="1" comment="bind-pkcs11 is &lt;9.9.4-29.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821883" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-29.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821884" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-29.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821885" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-29.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821886" version="1" comment="bind-sdb is &lt;9.9.4-29.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821887" version="1" comment="bind-sdb-chroot is &lt;9.9.4-29.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821888" version="1" comment="bind-utils is &lt;9.9.4-29.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821889" version="1" comment="thunderbird is &lt;38.7.0-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821890" version="1" comment="openssh is &lt;6.6.1p1-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821891" version="1" comment="openssh-askpass is &lt;6.6.1p1-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821892" version="1" comment="openssh-clients is &lt;6.6.1p1-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821893" version="1" comment="openssh-keycat is &lt;6.6.1p1-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821894" version="1" comment="openssh-ldap is &lt;6.6.1p1-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821895" version="1" comment="openssh-server is &lt;6.6.1p1-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821896" version="1" comment="openssh-server-sysvinit is &lt;6.6.1p1-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821897" version="1" comment="pam_ssh_agent_auth is &lt;0.9.3-9.25.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821898" version="1" comment="emacs-git is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821899" version="1" comment="emacs-git-el is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821900" version="1" comment="git is &lt;1.8.3.1-6.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821901" version="1" comment="git-all is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821902" version="1" comment="git-bzr is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821903" version="1" comment="git-cvs is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821904" version="1" comment="git-daemon is &lt;1.8.3.1-6.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821905" version="1" comment="git-email is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821906" version="1" comment="git-gui is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821907" version="1" comment="git-hg is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821908" version="1" comment="git-p4 is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821909" version="1" comment="git-svn is &lt;1.8.3.1-6.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821910" version="1" comment="gitk is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821911" version="1" comment="gitweb is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821912" version="1" comment="perl-Git is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821913" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-6.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821914" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.99-2.6.5.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821915" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.99-2.6.5.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821916" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.99-2.6.5.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821917" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.99-2.6.5.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821918" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.99-2.6.5.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821919" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.99-2.6.5.0.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821920" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.99-2.6.5.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821921" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821922" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821923" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821924" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821925" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821926" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821927" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821928" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821929" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821930" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821931" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.77-0.b03.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821932" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.77-0.b03.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821933" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821934" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.77-0.b03.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821935" version="1" comment="krb5-devel is &lt;1.13.2-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821936" version="1" comment="krb5-libs is &lt;1.13.2-12.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821937" version="1" comment="krb5-pkinit is &lt;1.13.2-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821938" version="1" comment="krb5-server is &lt;1.13.2-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821939" version="1" comment="krb5-server-ldap is &lt;1.13.2-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821940" version="1" comment="krb5-workstation is &lt;1.13.2-12.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821941" version="1" comment="mariadb is &lt;5.5.47-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821942" version="1" comment="mariadb-bench is &lt;5.5.47-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821943" version="1" comment="mariadb-devel is &lt;5.5.47-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821944" version="1" comment="mariadb-embedded is &lt;5.5.47-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821945" version="1" comment="mariadb-embedded-devel is &lt;5.5.47-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821946" version="1" comment="mariadb-libs is &lt;5.5.47-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821947" version="1" comment="mariadb-server is &lt;5.5.47-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821948" version="1" comment="mariadb-test is &lt;5.5.47-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821949" version="1" comment="graphite2 is &lt;1.3.6-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821950" version="1" comment="graphite2-devel is &lt;1.3.6-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821951" version="1" comment="ctdb is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821952" version="1" comment="ctdb-devel is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821953" version="1" comment="ctdb-tests is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821954" version="1" comment="ipa-admintools is &lt;4.2.0-15.el7_2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821955" version="1" comment="ipa-client is &lt;4.2.0-15.el7_2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821956" version="1" comment="ipa-python is &lt;4.2.0-15.el7_2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821957" version="1" comment="ipa-server is &lt;4.2.0-15.el7_2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821958" version="1" comment="ipa-server-dns is &lt;4.2.0-15.el7_2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821959" version="1" comment="ipa-server-trust-ad is &lt;4.2.0-15.el7_2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821960" version="1" comment="ldb-tools is &lt;1.1.25-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821961" version="1" comment="libldb is &lt;1.1.25-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821962" version="1" comment="libldb-devel is &lt;1.1.25-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821963" version="1" comment="libsmbclient is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821964" version="1" comment="libsmbclient-devel is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821965" version="1" comment="libtalloc is &lt;2.1.5-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821966" version="1" comment="libtalloc-devel is &lt;2.1.5-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821967" version="1" comment="libtdb is &lt;1.3.8-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821968" version="1" comment="libtdb-devel is &lt;1.3.8-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821969" version="1" comment="libtevent is &lt;0.9.26-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821970" version="1" comment="libtevent-devel is &lt;0.9.26-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821971" version="1" comment="libwbclient is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821972" version="1" comment="libwbclient-devel is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821973" version="1" comment="openchange is &lt;2.0-10.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821974" version="1" comment="openchange-client is &lt;2.0-10.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821975" version="1" comment="openchange-devel is &lt;2.0-10.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821976" version="1" comment="openchange-devel-docs is &lt;2.0-10.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821977" version="1" comment="pyldb is &lt;1.1.25-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821978" version="1" comment="pyldb-devel is &lt;1.1.25-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821979" version="1" comment="pytalloc is &lt;2.1.5-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821980" version="1" comment="pytalloc-devel is &lt;2.1.5-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821981" version="1" comment="python-tdb is &lt;1.3.8-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821982" version="1" comment="python-tevent is &lt;0.9.26-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821983" version="1" comment="samba is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821984" version="1" comment="samba-client is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821985" version="1" comment="samba-client-libs is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821986" version="1" comment="samba-common is &lt;4.2.10-6.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821987" version="1" comment="samba-common-libs is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821988" version="1" comment="samba-common-tools is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821989" version="1" comment="samba-dc is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821990" version="1" comment="samba-dc-libs is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821991" version="1" comment="samba-devel is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821992" version="1" comment="samba-libs is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821993" version="1" comment="samba-pidl is &lt;4.2.10-6.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821994" version="1" comment="samba-python is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821995" version="1" comment="samba-test is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821996" version="1" comment="samba-test-devel is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821997" version="1" comment="samba-test-libs is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821998" version="1" comment="samba-vfs-glusterfs is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009821999" version="1" comment="samba-winbind is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822000" version="1" comment="samba-winbind-clients is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822001" version="1" comment="samba-winbind-krb5-locator is &lt;4.2.10-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822002" version="1" comment="samba-winbind-modules is &lt;4.2.10-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822003" version="1" comment="tdb-tools is &lt;1.3.8-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822004" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822005" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822006" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822007" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822008" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822009" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822010" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822011" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822012" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822013" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.91-0.b14.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822014" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.91-0.b14.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822015" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822016" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.91-0.b14.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822017" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.101-2.6.6.1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822018" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.101-2.6.6.1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822019" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.101-2.6.6.1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822020" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.101-2.6.6.1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822021" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.101-2.6.6.1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822022" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.101-2.6.6.1.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822023" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.101-2.6.6.1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822024" version="1" comment="nspr is &lt;4.11.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822025" version="1" comment="nspr-devel is &lt;4.11.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822026" version="1" comment="nss is &lt;3.21.0-9.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822027" version="1" comment="nss-devel is &lt;3.21.0-9.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822028" version="1" comment="nss-pkcs11-devel is &lt;3.21.0-9.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822029" version="1" comment="nss-softokn is &lt;3.16.2.3-14.2.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822030" version="1" comment="nss-softokn-devel is &lt;3.16.2.3-14.2.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822031" version="1" comment="nss-softokn-freebl is &lt;3.16.2.3-14.2.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822032" version="1" comment="nss-softokn-freebl-devel is &lt;3.16.2.3-14.2.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822033" version="1" comment="nss-sysinit is &lt;3.21.0-9.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822034" version="1" comment="nss-tools is &lt;3.21.0-9.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822035" version="1" comment="nss-util is &lt;3.21.0-2.2.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822036" version="1" comment="nss-util-devel is &lt;3.21.0-2.2.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822037" version="1" comment="firefox is &lt;45.1.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822038" version="1" comment="emacs-mercurial is &lt;2.6.2-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822039" version="1" comment="emacs-mercurial-el is &lt;2.6.2-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822040" version="1" comment="mercurial is &lt;2.6.2-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822041" version="1" comment="mercurial-hgk is &lt;2.6.2-6.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822042" version="1" comment="openssl is &lt;1.0.1e-51.el7_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822043" version="1" comment="openssl-devel is &lt;1.0.1e-51.el7_2.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822044" version="1" comment="openssl-libs is &lt;1.0.1e-51.el7_2.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822045" version="1" comment="openssl-perl is &lt;1.0.1e-51.el7_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822046" version="1" comment="openssl-static is &lt;1.0.1e-51.el7_2.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822047" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.39-1.13.11.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822048" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.39-1.13.11.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822049" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.39-1.13.11.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822050" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.39-1.13.11.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822051" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.39-1.13.11.0.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822052" version="1" comment="libcacard is &lt;1.5.3-105.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822053" version="1" comment="libcacard-devel is &lt;1.5.3-105.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822054" version="1" comment="libcacard-tools is &lt;1.5.3-105.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822055" version="1" comment="qemu-img is &lt;1.5.3-105.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822056" version="1" comment="qemu-kvm is &lt;1.5.3-105.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822057" version="1" comment="qemu-kvm-common is &lt;1.5.3-105.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822058" version="1" comment="qemu-kvm-tools is &lt;1.5.3-105.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822059" version="1" comment="ImageMagick is &lt;6.7.8.9-13.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822060" version="1" comment="ImageMagick-c++ is &lt;6.7.8.9-13.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822061" version="1" comment="ImageMagick-c++-devel is &lt;6.7.8.9-13.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822062" version="1" comment="ImageMagick-devel is &lt;6.7.8.9-13.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822063" version="1" comment="ImageMagick-doc is &lt;6.7.8.9-13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822064" version="1" comment="ImageMagick-perl is &lt;6.7.8.9-13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822065" version="1" comment="pcre is &lt;8.32-15.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822066" version="1" comment="pcre-devel is &lt;8.32-15.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822067" version="1" comment="pcre-static is &lt;8.32-15.el7_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822068" version="1" comment="pcre-tools is &lt;8.32-15.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822069" version="1" comment="kernel is &lt;3.10.0-327.18.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822070" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.18.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822071" version="1" comment="kernel-debug is &lt;3.10.0-327.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822074" version="1" comment="kernel-doc is &lt;3.10.0-327.18.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822075" version="1" comment="kernel-headers is &lt;3.10.0-327.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822076" version="1" comment="kernel-tools is &lt;3.10.0-327.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822077" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822079" version="1" comment="perf is &lt;3.10.0-327.18.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822080" version="1" comment="python-perf is &lt;3.10.0-327.18.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822081" version="1" comment="thunderbird is &lt;38.8.0-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822082" version="1" comment="libndp is &lt;1.2-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822083" version="1" comment="libndp-devel is &lt;1.2-6.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822084" version="1" comment="squid is &lt;3.3.8-26.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822085" version="1" comment="squid-sysvinit is &lt;3.3.8-26.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822086" version="1" comment="ntp is &lt;4.2.6p5-22.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822087" version="1" comment="ntp-doc is &lt;4.2.6p5-22.el7_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822088" version="1" comment="ntp-perl is &lt;4.2.6p5-22.el7_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822089" version="1" comment="ntpdate is &lt;4.2.6p5-22.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822090" version="1" comment="sntp is &lt;4.2.6p5-22.el7_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822091" version="1" comment="spice-server is &lt;0.12.4-15.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822092" version="1" comment="spice-server-devel is &lt;0.12.4-15.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822093" version="1" comment="firefox is &lt;45.2.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822094" version="1" comment="ImageMagick is &lt;6.7.8.9-15.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822095" version="1" comment="ImageMagick-c++ is &lt;6.7.8.9-15.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822096" version="1" comment="ImageMagick-c++-devel is &lt;6.7.8.9-15.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822097" version="1" comment="ImageMagick-devel is &lt;6.7.8.9-15.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822098" version="1" comment="ImageMagick-doc is &lt;6.7.8.9-15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822099" version="1" comment="ImageMagick-perl is &lt;6.7.8.9-15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822100" version="1" comment="kernel is &lt;3.10.0-327.22.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822101" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.22.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822102" version="1" comment="kernel-debug is &lt;3.10.0-327.22.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822105" version="1" comment="kernel-doc is &lt;3.10.0-327.22.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822106" version="1" comment="kernel-headers is &lt;3.10.0-327.22.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822107" version="1" comment="kernel-tools is &lt;3.10.0-327.22.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822108" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.22.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822110" version="1" comment="perf is &lt;3.10.0-327.22.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822111" version="1" comment="python-perf is &lt;3.10.0-327.22.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822112" version="1" comment="libxml2 is &lt;2.9.1-6.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822113" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822114" version="1" comment="libxml2-python is &lt;2.9.1-6.el7_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822115" version="1" comment="libxml2-static is &lt;2.9.1-6.el7_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822116" version="1" comment="setroubleshoot is &lt;3.2.24-4.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822117" version="1" comment="setroubleshoot-plugins is &lt;3.0.59-2.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822118" version="1" comment="setroubleshoot-server is &lt;3.2.24-4.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822119" version="1" comment="ocaml is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822120" version="1" comment="ocaml-camlp4 is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822121" version="1" comment="ocaml-camlp4-devel is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822122" version="1" comment="ocaml-compiler-libs is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822123" version="1" comment="ocaml-docs is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822124" version="1" comment="ocaml-emacs is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822125" version="1" comment="ocaml-labltk is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822126" version="1" comment="ocaml-labltk-devel is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822127" version="1" comment="ocaml-ocamldoc is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822128" version="1" comment="ocaml-runtime is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822129" version="1" comment="ocaml-source is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822130" version="1" comment="ocaml-x11 is &lt;4.01.0-22.7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822131" version="1" comment="thunderbird is &lt;45.2-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822132" version="1" comment="httpd is &lt;2.4.6-40.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822133" version="1" comment="httpd-devel is &lt;2.4.6-40.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822134" version="1" comment="httpd-manual is &lt;2.4.6-40.el7_2.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822135" version="1" comment="httpd-tools is &lt;2.4.6-40.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822136" version="1" comment="mod_ldap is &lt;2.4.6-40.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822137" version="1" comment="mod_proxy_html is &lt;2.4.6-40.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822138" version="1" comment="mod_session is &lt;2.4.6-40.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822139" version="1" comment="mod_ssl is &lt;2.4.6-40.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822140" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822141" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822142" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822143" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822144" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822145" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822146" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822147" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822148" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822149" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822150" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.101-3.b13.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822151" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.101-3.b13.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822152" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822153" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.101-3.b13.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822154" version="1" comment="ctdb is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822155" version="1" comment="ctdb-devel is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822156" version="1" comment="ctdb-tests is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822157" version="1" comment="libsmbclient is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822158" version="1" comment="libsmbclient-devel is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822159" version="1" comment="libwbclient is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822160" version="1" comment="libwbclient-devel is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822161" version="1" comment="samba is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822162" version="1" comment="samba-client is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822163" version="1" comment="samba-client-libs is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822164" version="1" comment="samba-common is &lt;4.2.10-7.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822165" version="1" comment="samba-common-libs is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822166" version="1" comment="samba-common-tools is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822167" version="1" comment="samba-dc is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822168" version="1" comment="samba-dc-libs is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822169" version="1" comment="samba-devel is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822170" version="1" comment="samba-libs is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822171" version="1" comment="samba-pidl is &lt;4.2.10-7.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822172" version="1" comment="samba-python is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822173" version="1" comment="samba-test is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822174" version="1" comment="samba-test-devel is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822175" version="1" comment="samba-test-libs is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822176" version="1" comment="samba-vfs-glusterfs is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822177" version="1" comment="samba-winbind is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822178" version="1" comment="samba-winbind-clients is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822179" version="1" comment="samba-winbind-krb5-locator is &lt;4.2.10-7.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822180" version="1" comment="samba-winbind-modules is &lt;4.2.10-7.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822181" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.111-2.6.7.2.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822182" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.111-2.6.7.2.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822183" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.111-2.6.7.2.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822184" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.111-2.6.7.2.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822185" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.111-2.6.7.2.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822186" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.111-2.6.7.2.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822187" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.111-2.6.7.2.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822188" version="1" comment="golang is &lt;1.6.3-1.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822189" version="1" comment="golang-bin is &lt;1.6.3-1.el7_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822190" version="1" comment="golang-docs is &lt;1.6.3-1.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822191" version="1" comment="golang-misc is &lt;1.6.3-1.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822192" version="1" comment="golang-src is &lt;1.6.3-1.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822193" version="1" comment="golang-tests is &lt;1.6.3-1.el7_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822194" version="1" comment="kernel is &lt;3.10.0-327.28.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822195" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.28.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822196" version="1" comment="kernel-debug is &lt;3.10.0-327.28.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822199" version="1" comment="kernel-doc is &lt;3.10.0-327.28.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822200" version="1" comment="kernel-headers is &lt;3.10.0-327.28.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822201" version="1" comment="kernel-tools is &lt;3.10.0-327.28.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822202" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.28.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822204" version="1" comment="perf is &lt;3.10.0-327.28.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822205" version="1" comment="python-perf is &lt;3.10.0-327.28.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822206" version="1" comment="libtiff is &lt;4.0.3-25.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822207" version="1" comment="libtiff-devel is &lt;4.0.3-25.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822208" version="1" comment="libtiff-static is &lt;4.0.3-25.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822209" version="1" comment="libtiff-tools is &lt;4.0.3-25.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822210" version="1" comment="firefox is &lt;45.3.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822211" version="1" comment="mariadb is &lt;5.5.50-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822212" version="1" comment="mariadb-bench is &lt;5.5.50-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822213" version="1" comment="mariadb-devel is &lt;5.5.50-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822214" version="1" comment="mariadb-embedded is &lt;5.5.50-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822215" version="1" comment="mariadb-embedded-devel is &lt;5.5.50-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822216" version="1" comment="mariadb-libs is &lt;5.5.50-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822217" version="1" comment="mariadb-server is &lt;5.5.50-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822218" version="1" comment="mariadb-test is &lt;5.5.50-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822219" version="1" comment="libcacard is &lt;1.5.3-105.el7_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822220" version="1" comment="libcacard-devel is &lt;1.5.3-105.el7_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822221" version="1" comment="libcacard-tools is &lt;1.5.3-105.el7_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822222" version="1" comment="qemu-img is &lt;1.5.3-105.el7_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822223" version="1" comment="qemu-kvm is &lt;1.5.3-105.el7_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822224" version="1" comment="qemu-kvm-common is &lt;1.5.3-105.el7_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822225" version="1" comment="qemu-kvm-tools is &lt;1.5.3-105.el7_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822226" version="1" comment="php is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822227" version="1" comment="php-bcmath is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822228" version="1" comment="php-cli is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822229" version="1" comment="php-common is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822230" version="1" comment="php-dba is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822231" version="1" comment="php-devel is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822232" version="1" comment="php-embedded is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822233" version="1" comment="php-enchant is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822234" version="1" comment="php-fpm is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822235" version="1" comment="php-gd is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822236" version="1" comment="php-intl is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822237" version="1" comment="php-ldap is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822238" version="1" comment="php-mbstring is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822239" version="1" comment="php-mysql is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822240" version="1" comment="php-mysqlnd is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822241" version="1" comment="php-odbc is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822242" version="1" comment="php-pdo is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822243" version="1" comment="php-pgsql is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822244" version="1" comment="php-process is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822245" version="1" comment="php-pspell is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822246" version="1" comment="php-recode is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822247" version="1" comment="php-snmp is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822248" version="1" comment="php-soap is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822249" version="1" comment="php-xml is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822250" version="1" comment="php-xmlrpc is &lt;5.4.16-36.3.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822251" version="1" comment="python is &lt;2.7.5-38.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822252" version="1" comment="python-debug is &lt;2.7.5-38.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822253" version="1" comment="python-devel is &lt;2.7.5-38.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822254" version="1" comment="python-libs is &lt;2.7.5-38.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822255" version="1" comment="python-test is &lt;2.7.5-38.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822256" version="1" comment="python-tools is &lt;2.7.5-38.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822257" version="1" comment="tkinter is &lt;2.7.5-38.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822258" version="1" comment="kernel is &lt;3.10.0-327.28.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822259" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.28.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822260" version="1" comment="kernel-debug is &lt;3.10.0-327.28.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822263" version="1" comment="kernel-doc is &lt;3.10.0-327.28.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822264" version="1" comment="kernel-headers is &lt;3.10.0-327.28.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822265" version="1" comment="kernel-tools is &lt;3.10.0-327.28.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822266" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.28.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822268" version="1" comment="perf is &lt;3.10.0-327.28.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822269" version="1" comment="python-perf is &lt;3.10.0-327.28.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822270" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.40-1.13.12.5.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822271" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.40-1.13.12.5.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822272" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.40-1.13.12.5.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822273" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.40-1.13.12.5.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822274" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.40-1.13.12.5.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822275" version="1" comment="ipa-admintools is &lt;4.2.0-15.el7_2.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822276" version="1" comment="ipa-client is &lt;4.2.0-15.el7_2.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822277" version="1" comment="ipa-python is &lt;4.2.0-15.el7_2.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822278" version="1" comment="ipa-server is &lt;4.2.0-15.el7_2.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822279" version="1" comment="ipa-server-dns is &lt;4.2.0-15.el7_2.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822280" version="1" comment="ipa-server-trust-ad is &lt;4.2.0-15.el7_2.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822281" version="1" comment="thunderbird is &lt;45.3.0-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822282" version="1" comment="bsdcpio is &lt;3.1.2-10.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822283" version="1" comment="bsdtar is &lt;3.1.2-10.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822284" version="1" comment="libarchive is &lt;3.1.2-10.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822285" version="1" comment="libarchive-devel is &lt;3.1.2-10.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822286" version="1" comment="kernel is &lt;3.10.0-327.36.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822287" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.36.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822288" version="1" comment="kernel-debug is &lt;3.10.0-327.36.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822291" version="1" comment="kernel-doc is &lt;3.10.0-327.36.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822292" version="1" comment="kernel-headers is &lt;3.10.0-327.36.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822293" version="1" comment="kernel-tools is &lt;3.10.0-327.36.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822294" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.36.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822296" version="1" comment="perf is &lt;3.10.0-327.36.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822297" version="1" comment="python-perf is &lt;3.10.0-327.36.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822298" version="1" comment="firefox is &lt;45.4.0-1.el7_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822299" version="1" comment="openssl is &lt;1.0.1e-51.el7_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822300" version="1" comment="openssl-devel is &lt;1.0.1e-51.el7_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822301" version="1" comment="openssl-libs is &lt;1.0.1e-51.el7_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822302" version="1" comment="openssl-perl is &lt;1.0.1e-51.el7_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822303" version="1" comment="openssl-static is &lt;1.0.1e-51.el7_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822304" version="1" comment="bind is &lt;9.9.4-29.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822305" version="1" comment="bind-chroot is &lt;9.9.4-29.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822306" version="1" comment="bind-devel is &lt;9.9.4-29.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822307" version="1" comment="bind-libs is &lt;9.9.4-29.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822308" version="1" comment="bind-libs-lite is &lt;9.9.4-29.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822309" version="1" comment="bind-license is &lt;9.9.4-29.el7_2.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822310" version="1" comment="bind-lite-devel is &lt;9.9.4-29.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822311" version="1" comment="bind-pkcs11 is &lt;9.9.4-29.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822312" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-29.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822313" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-29.el7_2.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822314" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-29.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822315" version="1" comment="bind-sdb is &lt;9.9.4-29.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822316" version="1" comment="bind-sdb-chroot is &lt;9.9.4-29.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822317" version="1" comment="bind-utils is &lt;9.9.4-29.el7_2.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822318" version="1" comment="python-twisted-web is &lt;12.1.0-5.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822319" version="1" comment="thunderbird is &lt;45.4.0-1.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822320" version="1" comment="tomcat is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822321" version="1" comment="tomcat-admin-webapps is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822322" version="1" comment="tomcat-docs-webapp is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822323" version="1" comment="tomcat-el-2.2-api is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822324" version="1" comment="tomcat-javadoc is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822325" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822326" version="1" comment="tomcat-jsvc is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822327" version="1" comment="tomcat-lib is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822328" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822329" version="1" comment="tomcat-webapps is &lt;7.0.54-8.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822330" version="1" comment="kernel is &lt;3.10.0-327.36.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822331" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.36.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822332" version="1" comment="kernel-debug is &lt;3.10.0-327.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822335" version="1" comment="kernel-doc is &lt;3.10.0-327.36.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822336" version="1" comment="kernel-headers is &lt;3.10.0-327.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822337" version="1" comment="kernel-tools is &lt;3.10.0-327.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822338" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822340" version="1" comment="perf is &lt;3.10.0-327.36.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822341" version="1" comment="python-perf is &lt;3.10.0-327.36.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822342" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822343" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822344" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822345" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822346" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822347" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822348" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822349" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822350" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822351" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822352" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.111-1.b15.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822353" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.111-1.b15.el7_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822354" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822355" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.111-1.b15.el7_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822356" version="1" comment="kernel is &lt;3.10.0-327.36.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822357" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-327.36.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822358" version="1" comment="kernel-debug is &lt;3.10.0-327.36.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822361" version="1" comment="kernel-doc is &lt;3.10.0-327.36.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822362" version="1" comment="kernel-headers is &lt;3.10.0-327.36.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822363" version="1" comment="kernel-tools is &lt;3.10.0-327.36.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822364" version="1" comment="kernel-tools-libs is &lt;3.10.0-327.36.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822366" version="1" comment="perf is &lt;3.10.0-327.36.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822367" version="1" comment="python-perf is &lt;3.10.0-327.36.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822368" version="1" comment="glibc is &lt;2.17-157.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822369" version="1" comment="glibc-common is &lt;2.17-157.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822370" version="1" comment="glibc-devel is &lt;2.17-157.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822371" version="1" comment="glibc-headers is &lt;2.17-157.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822372" version="1" comment="glibc-static is &lt;2.17-157.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822373" version="1" comment="glibc-utils is &lt;2.17-157.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822374" version="1" comment="nscd is &lt;2.17-157.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822375" version="1" comment="kernel is &lt;3.10.0-514.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822376" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822377" version="1" comment="kernel-debug is &lt;3.10.0-514.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822380" version="1" comment="kernel-doc is &lt;3.10.0-514.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822381" version="1" comment="kernel-headers is &lt;3.10.0-514.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822382" version="1" comment="kernel-tools is &lt;3.10.0-514.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822383" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822385" version="1" comment="perf is &lt;3.10.0-514.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822386" version="1" comment="python-perf is &lt;3.10.0-514.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822387" version="1" comment="curl is &lt;7.29.0-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822388" version="1" comment="libcurl is &lt;7.29.0-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822389" version="1" comment="libcurl-devel is &lt;7.29.0-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822390" version="1" comment="libguestfs is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822391" version="1" comment="libguestfs-bash-completion is &lt;1.32.7-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822392" version="1" comment="libguestfs-devel is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822393" version="1" comment="libguestfs-gfs2 is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822394" version="1" comment="libguestfs-gobject is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822395" version="1" comment="libguestfs-gobject-devel is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822396" version="1" comment="libguestfs-gobject-doc is &lt;1.32.7-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822397" version="1" comment="libguestfs-inspect-icons is &lt;1.32.7-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822398" version="1" comment="libguestfs-java is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822399" version="1" comment="libguestfs-java-devel is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822400" version="1" comment="libguestfs-javadoc is &lt;1.32.7-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822401" version="1" comment="libguestfs-man-pages-ja is &lt;1.32.7-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822402" version="1" comment="libguestfs-man-pages-uk is &lt;1.32.7-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822403" version="1" comment="libguestfs-rescue is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822404" version="1" comment="libguestfs-rsync is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822405" version="1" comment="libguestfs-tools is &lt;1.32.7-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822406" version="1" comment="libguestfs-tools-c is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822407" version="1" comment="libguestfs-xfs is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822408" version="1" comment="lua-guestfs is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822409" version="1" comment="ocaml-libguestfs is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822410" version="1" comment="ocaml-libguestfs-devel is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822411" version="1" comment="perl-Sys-Guestfs is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822412" version="1" comment="python-libguestfs is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822413" version="1" comment="ruby-libguestfs is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822414" version="1" comment="virt-dib is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822415" version="1" comment="virt-v2v is &lt;1.32.7-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822416" version="1" comment="libvirt is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822417" version="1" comment="libvirt-client is &lt;2.0.0-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822418" version="1" comment="libvirt-daemon is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822419" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822420" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822421" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822422" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822423" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822424" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822425" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822426" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822427" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822428" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822429" version="1" comment="libvirt-daemon-kvm is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822430" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822431" version="1" comment="libvirt-devel is &lt;2.0.0-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822432" version="1" comment="libvirt-docs is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822433" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822434" version="1" comment="libvirt-login-shell is &lt;2.0.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822435" version="1" comment="libvirt-nss is &lt;2.0.0-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822436" version="1" comment="pacemaker is &lt;1.1.15-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822437" version="1" comment="pacemaker-cli is &lt;1.1.15-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822438" version="1" comment="pacemaker-cluster-libs is &lt;1.1.15-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822439" version="1" comment="pacemaker-cts is &lt;1.1.15-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822440" version="1" comment="pacemaker-doc is &lt;1.1.15-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822441" version="1" comment="pacemaker-libs is &lt;1.1.15-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822442" version="1" comment="pacemaker-libs-devel is &lt;1.1.15-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822443" version="1" comment="pacemaker-nagios-plugins-metadata is &lt;1.1.15-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822444" version="1" comment="pacemaker-remote is &lt;1.1.15-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822445" version="1" comment="poppler is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822446" version="1" comment="poppler-cpp is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822447" version="1" comment="poppler-cpp-devel is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822448" version="1" comment="poppler-demos is &lt;0.26.5-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822449" version="1" comment="poppler-devel is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822450" version="1" comment="poppler-glib is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822451" version="1" comment="poppler-glib-devel is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822452" version="1" comment="poppler-qt is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822453" version="1" comment="poppler-qt-devel is &lt;0.26.5-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822454" version="1" comment="poppler-utils is &lt;0.26.5-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822455" version="1" comment="NetworkManager is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822456" version="1" comment="NetworkManager-adsl is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822457" version="1" comment="NetworkManager-bluetooth is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822458" version="1" comment="NetworkManager-config-server is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822459" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.4.0-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822460" version="1" comment="NetworkManager-glib is &lt;1.4.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822461" version="1" comment="NetworkManager-glib-devel is &lt;1.4.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822462" version="1" comment="NetworkManager-libnm is &lt;1.4.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822463" version="1" comment="NetworkManager-libnm-devel is &lt;1.4.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822464" version="1" comment="NetworkManager-libreswan is &lt;1.2.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822465" version="1" comment="NetworkManager-libreswan-gnome is &lt;1.2.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822466" version="1" comment="NetworkManager-team is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822467" version="1" comment="NetworkManager-tui is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822468" version="1" comment="NetworkManager-wifi is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822469" version="1" comment="NetworkManager-wwan is &lt;1.4.0-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822470" version="1" comment="libnl3 is &lt;3.2.28-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822471" version="1" comment="libnl3-cli is &lt;3.2.28-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822472" version="1" comment="libnl3-devel is &lt;3.2.28-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822473" version="1" comment="libnl3-doc is &lt;3.2.28-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822474" version="1" comment="libnm-gtk is &lt;1.4.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822475" version="1" comment="libnm-gtk-devel is &lt;1.4.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822476" version="1" comment="libnma is &lt;1.4.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822477" version="1" comment="libnma-devel is &lt;1.4.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822478" version="1" comment="network-manager-applet is &lt;1.4.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822479" version="1" comment="nm-connection-editor is &lt;1.4.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822480" version="1" comment="nettle is &lt;2.7.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822481" version="1" comment="nettle-devel is &lt;2.7.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822482" version="1" comment="ntp is &lt;4.2.6p5-25.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822483" version="1" comment="ntp-doc is &lt;4.2.6p5-25.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822484" version="1" comment="ntp-perl is &lt;4.2.6p5-25.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822485" version="1" comment="ntpdate is &lt;4.2.6p5-25.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822486" version="1" comment="sntp is &lt;4.2.6p5-25.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822487" version="1" comment="qemu-img is &lt;1.5.3-126.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822488" version="1" comment="qemu-kvm is &lt;1.5.3-126.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822489" version="1" comment="qemu-kvm-common is &lt;1.5.3-126.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822490" version="1" comment="qemu-kvm-tools is &lt;1.5.3-126.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822491" version="1" comment="python is &lt;2.7.5-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822492" version="1" comment="python-debug is &lt;2.7.5-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822493" version="1" comment="python-devel is &lt;2.7.5-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822494" version="1" comment="python-libs is &lt;2.7.5-48.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822495" version="1" comment="python-test is &lt;2.7.5-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822496" version="1" comment="python-tools is &lt;2.7.5-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822497" version="1" comment="tkinter is &lt;2.7.5-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822498" version="1" comment="wget is &lt;1.14-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822499" version="1" comment="openssh is &lt;6.6.1p1-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822500" version="1" comment="openssh-askpass is &lt;6.6.1p1-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822501" version="1" comment="openssh-clients is &lt;6.6.1p1-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822502" version="1" comment="openssh-keycat is &lt;6.6.1p1-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822503" version="1" comment="openssh-ldap is &lt;6.6.1p1-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822504" version="1" comment="openssh-server is &lt;6.6.1p1-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822505" version="1" comment="openssh-server-sysvinit is &lt;6.6.1p1-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822506" version="1" comment="pam_ssh_agent_auth is &lt;0.9.3-9.31.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822507" version="1" comment="gimp is &lt;2.8.16-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822508" version="1" comment="gimp-devel is &lt;2.8.16-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822509" version="1" comment="gimp-devel-tools is &lt;2.8.16-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822510" version="1" comment="gimp-help is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822511" version="1" comment="gimp-help-ca is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822512" version="1" comment="gimp-help-da is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822513" version="1" comment="gimp-help-de is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822514" version="1" comment="gimp-help-el is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822515" version="1" comment="gimp-help-en_GB is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822516" version="1" comment="gimp-help-es is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822517" version="1" comment="gimp-help-fr is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822518" version="1" comment="gimp-help-it is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822519" version="1" comment="gimp-help-ja is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822520" version="1" comment="gimp-help-ko is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822521" version="1" comment="gimp-help-nl is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822522" version="1" comment="gimp-help-nn is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822523" version="1" comment="gimp-help-pt_BR is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822524" version="1" comment="gimp-help-ru is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822525" version="1" comment="gimp-help-sl is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822526" version="1" comment="gimp-help-sv is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822527" version="1" comment="gimp-help-zh_CN is &lt;2.8.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822528" version="1" comment="gimp-libs is &lt;2.8.16-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822529" version="1" comment="dhclient is &lt;4.2.5-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822530" version="1" comment="dhcp is &lt;4.2.5-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822531" version="1" comment="dhcp-common is &lt;4.2.5-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822532" version="1" comment="dhcp-devel is &lt;4.2.5-47.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822533" version="1" comment="dhcp-libs is &lt;4.2.5-47.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822534" version="1" comment="krb5-devel is &lt;1.14.1-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822535" version="1" comment="krb5-libs is &lt;1.14.1-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822536" version="1" comment="krb5-pkinit is &lt;1.14.1-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822537" version="1" comment="krb5-server is &lt;1.14.1-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822538" version="1" comment="krb5-server-ldap is &lt;1.14.1-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822539" version="1" comment="krb5-workstation is &lt;1.14.1-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822540" version="1" comment="libkadm5 is &lt;1.14.1-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822541" version="1" comment="sudo is &lt;1.8.6p7-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822542" version="1" comment="sudo-devel is &lt;1.8.6p7-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822543" version="1" comment="389-ds-base is &lt;1.3.5.10-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822544" version="1" comment="389-ds-base-devel is &lt;1.3.5.10-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822545" version="1" comment="389-ds-base-libs is &lt;1.3.5.10-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822546" version="1" comment="389-ds-base-snmp is &lt;1.3.5.10-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822547" version="1" comment="mariadb is &lt;5.5.52-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822548" version="1" comment="mariadb-bench is &lt;5.5.52-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822549" version="1" comment="mariadb-devel is &lt;5.5.52-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822550" version="1" comment="mariadb-embedded is &lt;5.5.52-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822551" version="1" comment="mariadb-embedded-devel is &lt;5.5.52-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822552" version="1" comment="mariadb-libs is &lt;5.5.52-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822553" version="1" comment="mariadb-server is &lt;5.5.52-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822554" version="1" comment="mariadb-test is &lt;5.5.52-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822555" version="1" comment="pcs is &lt;0.9.152-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822556" version="1" comment="firewall-applet is &lt;0.4.3.2-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822557" version="1" comment="firewall-config is &lt;0.4.3.2-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822558" version="1" comment="firewalld is &lt;0.4.3.2-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822559" version="1" comment="firewalld-filesystem is &lt;0.4.3.2-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822560" version="1" comment="python-firewall is &lt;0.4.3.2-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822561" version="1" comment="php is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822562" version="1" comment="php-bcmath is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822563" version="1" comment="php-cli is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822564" version="1" comment="php-common is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822565" version="1" comment="php-dba is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822566" version="1" comment="php-devel is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822567" version="1" comment="php-embedded is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822568" version="1" comment="php-enchant is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822569" version="1" comment="php-fpm is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822570" version="1" comment="php-gd is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822571" version="1" comment="php-intl is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822572" version="1" comment="php-ldap is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822573" version="1" comment="php-mbstring is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822574" version="1" comment="php-mysql is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822575" version="1" comment="php-mysqlnd is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822576" version="1" comment="php-odbc is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822577" version="1" comment="php-pdo is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822578" version="1" comment="php-pgsql is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822579" version="1" comment="php-process is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822580" version="1" comment="php-pspell is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822581" version="1" comment="php-recode is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822582" version="1" comment="php-snmp is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822583" version="1" comment="php-soap is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822584" version="1" comment="php-xml is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822585" version="1" comment="php-xmlrpc is &lt;5.4.16-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822586" version="1" comment="tomcat is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822587" version="1" comment="tomcat-admin-webapps is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822588" version="1" comment="tomcat-docs-webapp is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822589" version="1" comment="tomcat-el-2.2-api is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822590" version="1" comment="tomcat-javadoc is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822591" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822592" version="1" comment="tomcat-jsvc is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822593" version="1" comment="tomcat-lib is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822594" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822595" version="1" comment="tomcat-webapps is &lt;7.0.69-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822596" version="1" comment="squid is &lt;3.5.20-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822597" version="1" comment="squid-migration-script is &lt;3.5.20-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822598" version="1" comment="squid-sysvinit is &lt;3.5.20-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822599" version="1" comment="fontconfig is &lt;2.10.95-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822600" version="1" comment="fontconfig-devel is &lt;2.10.95-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822601" version="1" comment="fontconfig-devel-doc is &lt;2.10.95-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822602" version="1" comment="mod_nss is &lt;1.0.14-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822603" version="1" comment="libreswan is &lt;3.15-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822604" version="1" comment="resteasy-base is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822605" version="1" comment="resteasy-base-atom-provider is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822606" version="1" comment="resteasy-base-client is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822607" version="1" comment="resteasy-base-jackson-provider is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822608" version="1" comment="resteasy-base-javadoc is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822609" version="1" comment="resteasy-base-jaxb-provider is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822610" version="1" comment="resteasy-base-jaxrs is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822611" version="1" comment="resteasy-base-jaxrs-all is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822612" version="1" comment="resteasy-base-jaxrs-api is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822613" version="1" comment="resteasy-base-jettison-provider is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822614" version="1" comment="resteasy-base-providers-pom is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822615" version="1" comment="resteasy-base-resteasy-pom is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822616" version="1" comment="resteasy-base-tjws is &lt;3.0.6-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822617" version="1" comment="libblkid is &lt;2.23.2-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822618" version="1" comment="libblkid-devel is &lt;2.23.2-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822619" version="1" comment="libmount is &lt;2.23.2-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822620" version="1" comment="libmount-devel is &lt;2.23.2-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822621" version="1" comment="libuuid is &lt;2.23.2-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822622" version="1" comment="libuuid-devel is &lt;2.23.2-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822623" version="1" comment="util-linux is &lt;2.23.2-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822624" version="1" comment="uuidd is &lt;2.23.2-33.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822625" version="1" comment="postgresql is &lt;9.2.18-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822626" version="1" comment="postgresql-contrib is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822627" version="1" comment="postgresql-devel is &lt;9.2.18-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822628" version="1" comment="postgresql-docs is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822629" version="1" comment="postgresql-libs is &lt;9.2.18-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822630" version="1" comment="postgresql-plperl is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822631" version="1" comment="postgresql-plpython is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822632" version="1" comment="postgresql-pltcl is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822633" version="1" comment="postgresql-server is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822634" version="1" comment="postgresql-test is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822635" version="1" comment="postgresql-upgrade is &lt;9.2.18-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822636" version="1" comment="libgudev1 is &lt;219-30.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822637" version="1" comment="libgudev1-devel is &lt;219-30.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822638" version="1" comment="systemd is &lt;219-30.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822639" version="1" comment="systemd-devel is &lt;219-30.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822640" version="1" comment="systemd-journal-gateway is &lt;219-30.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822641" version="1" comment="systemd-libs is &lt;219-30.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822642" version="1" comment="systemd-networkd is &lt;219-30.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822643" version="1" comment="systemd-python is &lt;219-30.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822644" version="1" comment="systemd-resolved is &lt;219-30.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822645" version="1" comment="systemd-sysv is &lt;219-30.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822646" version="1" comment="pacemaker is &lt;1.1.15-11.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822647" version="1" comment="pacemaker-cli is &lt;1.1.15-11.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822648" version="1" comment="pacemaker-cluster-libs is &lt;1.1.15-11.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822649" version="1" comment="pacemaker-cts is &lt;1.1.15-11.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822650" version="1" comment="pacemaker-doc is &lt;1.1.15-11.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822651" version="1" comment="pacemaker-libs is &lt;1.1.15-11.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822652" version="1" comment="pacemaker-libs-devel is &lt;1.1.15-11.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822653" version="1" comment="pacemaker-nagios-plugins-metadata is &lt;1.1.15-11.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822654" version="1" comment="pacemaker-remote is &lt;1.1.15-11.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822655" version="1" comment="bind is &lt;9.9.4-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822656" version="1" comment="bind-chroot is &lt;9.9.4-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822657" version="1" comment="bind-devel is &lt;9.9.4-38.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822658" version="1" comment="bind-libs is &lt;9.9.4-38.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822659" version="1" comment="bind-libs-lite is &lt;9.9.4-38.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822660" version="1" comment="bind-license is &lt;9.9.4-38.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822661" version="1" comment="bind-lite-devel is &lt;9.9.4-38.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822662" version="1" comment="bind-pkcs11 is &lt;9.9.4-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822663" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-38.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822664" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-38.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822665" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822666" version="1" comment="bind-sdb is &lt;9.9.4-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822667" version="1" comment="bind-sdb-chroot is &lt;9.9.4-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822668" version="1" comment="bind-utils is &lt;9.9.4-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822669" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.121-2.6.8.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822670" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.121-2.6.8.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822671" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.121-2.6.8.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822672" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.121-2.6.8.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822673" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.121-2.6.8.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822674" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.121-2.6.8.0.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822675" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.121-2.6.8.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822676" version="1" comment="libgcrypt is &lt;1.5.3-13.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822677" version="1" comment="libgcrypt-devel is &lt;1.5.3-13.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822678" version="1" comment="policycoreutils is &lt;2.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822679" version="1" comment="policycoreutils-devel is &lt;2.5-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822680" version="1" comment="policycoreutils-gui is &lt;2.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822681" version="1" comment="policycoreutils-newrole is &lt;2.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822682" version="1" comment="policycoreutils-python is &lt;2.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822683" version="1" comment="policycoreutils-restorecond is &lt;2.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822684" version="1" comment="policycoreutils-sandbox is &lt;2.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822685" version="1" comment="nss is &lt;3.21.3-2.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822686" version="1" comment="nss-devel is &lt;3.21.3-2.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822687" version="1" comment="nss-pkcs11-devel is &lt;3.21.3-2.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822688" version="1" comment="nss-sysinit is &lt;3.21.3-2.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822689" version="1" comment="nss-tools is &lt;3.21.3-2.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822690" version="1" comment="nss-util is &lt;3.21.3-1.1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822691" version="1" comment="nss-util-devel is &lt;3.21.3-1.1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822692" version="1" comment="firefox is &lt;45.5.0-1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822693" version="1" comment="ipsilon is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822694" version="1" comment="ipsilon-authform is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822695" version="1" comment="ipsilon-authgssapi is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822696" version="1" comment="ipsilon-authldap is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822697" version="1" comment="ipsilon-base is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822698" version="1" comment="ipsilon-client is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822699" version="1" comment="ipsilon-filesystem is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822700" version="1" comment="ipsilon-infosssd is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822701" version="1" comment="ipsilon-persona is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822702" version="1" comment="ipsilon-saml2 is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822703" version="1" comment="ipsilon-saml2-base is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822704" version="1" comment="ipsilon-tools-ipa is &lt;1.0.0-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822705" version="1" comment="memcached is &lt;1.4.15-10.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822706" version="1" comment="memcached-devel is &lt;1.4.15-10.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822707" version="1" comment="expat is &lt;2.1.0-10.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822708" version="1" comment="expat-devel is &lt;2.1.0-10.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822709" version="1" comment="expat-static is &lt;2.1.0-10.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822710" version="1" comment="thunderbird is &lt;45.5.0-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822711" version="1" comment="firefox is &lt;45.5.1-1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822712" version="1" comment="thunderbird is &lt;45.5.1-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822713" version="1" comment="sudo is &lt;1.8.6p7-21.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822714" version="1" comment="sudo-devel is &lt;1.8.6p7-21.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822715" version="1" comment="firefox is &lt;45.6.0-1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822716" version="1" comment="vim-X11 is &lt;7.4.160-1.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822717" version="1" comment="vim-common is &lt;7.4.160-1.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822718" version="1" comment="vim-enhanced is &lt;7.4.160-1.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822719" version="1" comment="vim-filesystem is &lt;7.4.160-1.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822720" version="1" comment="vim-minimal is &lt;7.4.160-1.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822721" version="1" comment="thunderbird is &lt;45.6.0-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822722" version="1" comment="ipa-admintools is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822723" version="1" comment="ipa-client is &lt;4.4.0-14.el7_3.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822724" version="1" comment="ipa-client-common is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822725" version="1" comment="ipa-common is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822726" version="1" comment="ipa-python-compat is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822727" version="1" comment="ipa-server is &lt;4.4.0-14.el7_3.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822728" version="1" comment="ipa-server-common is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822729" version="1" comment="ipa-server-dns is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822730" version="1" comment="ipa-server-trust-ad is &lt;4.4.0-14.el7_3.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822731" version="1" comment="python2-ipaclient is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822732" version="1" comment="python2-ipalib is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822733" version="1" comment="python2-ipaserver is &lt;4.4.0-14.el7_3.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822734" version="1" comment="ghostscript is &lt;9.07-20.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822735" version="1" comment="ghostscript-cups is &lt;9.07-20.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822736" version="1" comment="ghostscript-devel is &lt;9.07-20.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822737" version="1" comment="ghostscript-doc is &lt;9.07-20.el7_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822738" version="1" comment="ghostscript-gtk is &lt;9.07-20.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822739" version="1" comment="gstreamer-plugins-bad-free is &lt;0.10.23-22.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822740" version="1" comment="gstreamer-plugins-bad-free-devel is &lt;0.10.23-22.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822741" version="1" comment="gstreamer-plugins-bad-free-devel-docs is &lt;0.10.23-22.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822742" version="1" comment="gstreamer-plugins-good is &lt;0.10.31-12.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822743" version="1" comment="gstreamer-plugins-good-devel-docs is &lt;0.10.31-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822744" version="1" comment="gstreamer1-plugins-good is &lt;1.4.5-3.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822745" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.4.5-6.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822746" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.4.5-6.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822747" version="1" comment="java-1.6.0-openjdk is &lt;1.6.0.41-1.13.13.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822748" version="1" comment="java-1.6.0-openjdk-demo is &lt;1.6.0.41-1.13.13.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822749" version="1" comment="java-1.6.0-openjdk-devel is &lt;1.6.0.41-1.13.13.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822750" version="1" comment="java-1.6.0-openjdk-javadoc is &lt;1.6.0.41-1.13.13.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822751" version="1" comment="java-1.6.0-openjdk-src is &lt;1.6.0.41-1.13.13.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822752" version="1" comment="bind is &lt;9.9.4-38.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822753" version="1" comment="bind-chroot is &lt;9.9.4-38.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822754" version="1" comment="bind-devel is &lt;9.9.4-38.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822755" version="1" comment="bind-libs is &lt;9.9.4-38.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822756" version="1" comment="bind-libs-lite is &lt;9.9.4-38.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822757" version="1" comment="bind-license is &lt;9.9.4-38.el7_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822758" version="1" comment="bind-lite-devel is &lt;9.9.4-38.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822759" version="1" comment="bind-pkcs11 is &lt;9.9.4-38.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822760" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-38.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822761" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-38.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822762" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-38.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822763" version="1" comment="bind-sdb is &lt;9.9.4-38.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822764" version="1" comment="bind-sdb-chroot is &lt;9.9.4-38.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822765" version="1" comment="bind-utils is &lt;9.9.4-38.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822766" version="1" comment="qemu-img is &lt;1.5.3-126.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822767" version="1" comment="qemu-kvm is &lt;1.5.3-126.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822768" version="1" comment="qemu-kvm-common is &lt;1.5.3-126.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822769" version="1" comment="qemu-kvm-tools is &lt;1.5.3-126.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822770" version="1" comment="kernel is &lt;3.10.0-514.6.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822771" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.6.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822772" version="1" comment="kernel-debug is &lt;3.10.0-514.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822775" version="1" comment="kernel-doc is &lt;3.10.0-514.6.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822776" version="1" comment="kernel-headers is &lt;3.10.0-514.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822777" version="1" comment="kernel-tools is &lt;3.10.0-514.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822778" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822780" version="1" comment="perf is &lt;3.10.0-514.6.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822781" version="1" comment="python-perf is &lt;3.10.0-514.6.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822782" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.121-0.b13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822783" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.121-0.b13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822784" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.121-0.b13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822785" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.121-0.b13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822786" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.121-0.b13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822787" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.121-0.b13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822788" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.121-0.b13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822789" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.121-0.b13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822790" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.121-0.b13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822791" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.121-0.b13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822792" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.121-0.b13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822793" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.121-0.b13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822794" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.121-0.b13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822795" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.121-0.b13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822796" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.121-0.b13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822797" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.121-0.b13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822798" version="1" comment="squid is &lt;3.5.20-2.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822799" version="1" comment="squid-migration-script is &lt;3.5.20-2.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822800" version="1" comment="squid-sysvinit is &lt;3.5.20-2.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822801" version="1" comment="firefox is &lt;45.7.0-1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822802" version="1" comment="libtiff is &lt;4.0.3-27.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822803" version="1" comment="libtiff-devel is &lt;4.0.3-27.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822804" version="1" comment="libtiff-static is &lt;4.0.3-27.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822805" version="1" comment="libtiff-tools is &lt;4.0.3-27.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822806" version="1" comment="thunderbird is &lt;45.7.0-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822807" version="1" comment="ntp is &lt;4.2.6p5-25.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822808" version="1" comment="ntp-doc is &lt;4.2.6p5-25.el7_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822809" version="1" comment="ntp-perl is &lt;4.2.6p5-25.el7_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822810" version="1" comment="ntpdate is &lt;4.2.6p5-25.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822811" version="1" comment="sntp is &lt;4.2.6p5-25.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822812" version="1" comment="spice-server is &lt;0.12.4-20.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822813" version="1" comment="spice-server-devel is &lt;0.12.4-20.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822814" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.131-2.6.9.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822815" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.131-2.6.9.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822816" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.131-2.6.9.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822817" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.131-2.6.9.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822818" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.131-2.6.9.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822819" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.131-2.6.9.0.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822820" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.131-2.6.9.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822821" version="1" comment="bind is &lt;9.9.4-38.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822822" version="1" comment="bind-chroot is &lt;9.9.4-38.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822823" version="1" comment="bind-devel is &lt;9.9.4-38.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822824" version="1" comment="bind-libs is &lt;9.9.4-38.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822825" version="1" comment="bind-libs-lite is &lt;9.9.4-38.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822826" version="1" comment="bind-license is &lt;9.9.4-38.el7_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822827" version="1" comment="bind-lite-devel is &lt;9.9.4-38.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822828" version="1" comment="bind-pkcs11 is &lt;9.9.4-38.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822829" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-38.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822830" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-38.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822831" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-38.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822832" version="1" comment="bind-sdb is &lt;9.9.4-38.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822833" version="1" comment="bind-sdb-chroot is &lt;9.9.4-38.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822834" version="1" comment="bind-utils is &lt;9.9.4-38.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822835" version="1" comment="openssl is &lt;1.0.1e-60.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822836" version="1" comment="openssl-devel is &lt;1.0.1e-60.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822837" version="1" comment="openssl-libs is &lt;1.0.1e-60.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822838" version="1" comment="openssl-perl is &lt;1.0.1e-60.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822839" version="1" comment="openssl-static is &lt;1.0.1e-60.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822840" version="1" comment="kernel is &lt;3.10.0-514.6.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822841" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.6.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822842" version="1" comment="kernel-debug is &lt;3.10.0-514.6.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822845" version="1" comment="kernel-doc is &lt;3.10.0-514.6.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822846" version="1" comment="kernel-headers is &lt;3.10.0-514.6.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822847" version="1" comment="kernel-tools is &lt;3.10.0-514.6.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822848" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.6.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822850" version="1" comment="perf is &lt;3.10.0-514.6.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822851" version="1" comment="python-perf is &lt;3.10.0-514.6.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822852" version="1" comment="kernel is &lt;3.10.0-514.10.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822853" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.10.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822854" version="1" comment="kernel-debug is &lt;3.10.0-514.10.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822857" version="1" comment="kernel-doc is &lt;3.10.0-514.10.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822858" version="1" comment="kernel-headers is &lt;3.10.0-514.10.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822859" version="1" comment="kernel-tools is &lt;3.10.0-514.10.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822860" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.10.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822862" version="1" comment="perf is &lt;3.10.0-514.10.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822863" version="1" comment="python-perf is &lt;3.10.0-514.10.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822864" version="1" comment="ipa-admintools is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822865" version="1" comment="ipa-client is &lt;4.4.0-14.el7_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822866" version="1" comment="ipa-client-common is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822867" version="1" comment="ipa-common is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822868" version="1" comment="ipa-python-compat is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822869" version="1" comment="ipa-server is &lt;4.4.0-14.el7_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822870" version="1" comment="ipa-server-common is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822871" version="1" comment="ipa-server-dns is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822872" version="1" comment="ipa-server-trust-ad is &lt;4.4.0-14.el7_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822873" version="1" comment="python2-ipaclient is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822874" version="1" comment="python2-ipalib is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822875" version="1" comment="python2-ipaserver is &lt;4.4.0-14.el7_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822876" version="1" comment="qemu-img is &lt;1.5.3-126.el7_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822877" version="1" comment="qemu-kvm is &lt;1.5.3-126.el7_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822878" version="1" comment="qemu-kvm-common is &lt;1.5.3-126.el7_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822879" version="1" comment="qemu-kvm-tools is &lt;1.5.3-126.el7_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822880" version="1" comment="firefox is &lt;52.0-4.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822881" version="1" comment="thunderbird is &lt;45.8.0-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822882" version="1" comment="firefox is &lt;52.0-5.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822883" version="1" comment="icoutils is &lt;0.31.3-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822884" version="1" comment="openjpeg is &lt;1.5.1-16.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822885" version="1" comment="openjpeg-devel is &lt;1.5.1-16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822886" version="1" comment="openjpeg-libs is &lt;1.5.1-16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822887" version="1" comment="httpd is &lt;2.4.6-45.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822888" version="1" comment="httpd-devel is &lt;2.4.6-45.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822889" version="1" comment="httpd-manual is &lt;2.4.6-45.el7_3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822890" version="1" comment="httpd-tools is &lt;2.4.6-45.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822891" version="1" comment="mod_ldap is &lt;2.4.6-45.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822892" version="1" comment="mod_proxy_html is &lt;2.4.6-45.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822893" version="1" comment="mod_session is &lt;2.4.6-45.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822894" version="1" comment="mod_ssl is &lt;2.4.6-45.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822895" version="1" comment="libblkid is &lt;2.23.2-33.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822896" version="1" comment="libblkid-devel is &lt;2.23.2-33.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822897" version="1" comment="libmount is &lt;2.23.2-33.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822898" version="1" comment="libmount-devel is &lt;2.23.2-33.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822899" version="1" comment="libuuid is &lt;2.23.2-33.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822900" version="1" comment="libuuid-devel is &lt;2.23.2-33.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822901" version="1" comment="util-linux is &lt;2.23.2-33.el7_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822902" version="1" comment="uuidd is &lt;2.23.2-33.el7_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822903" version="1" comment="389-ds-base is &lt;1.3.5.10-20.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822904" version="1" comment="389-ds-base-devel is &lt;1.3.5.10-20.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822905" version="1" comment="389-ds-base-libs is &lt;1.3.5.10-20.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822906" version="1" comment="389-ds-base-snmp is &lt;1.3.5.10-20.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822907" version="1" comment="kernel is &lt;3.10.0-514.16.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822908" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.16.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822909" version="1" comment="kernel-debug is &lt;3.10.0-514.16.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822912" version="1" comment="kernel-doc is &lt;3.10.0-514.16.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822913" version="1" comment="kernel-headers is &lt;3.10.0-514.16.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822914" version="1" comment="kernel-tools is &lt;3.10.0-514.16.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822915" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.16.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822917" version="1" comment="perf is &lt;3.10.0-514.16.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822918" version="1" comment="python-perf is &lt;3.10.0-514.16.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822919" version="1" comment="tomcat is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822920" version="1" comment="tomcat-admin-webapps is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822921" version="1" comment="tomcat-docs-webapp is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822922" version="1" comment="tomcat-el-2.2-api is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822923" version="1" comment="tomcat-javadoc is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822924" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822925" version="1" comment="tomcat-jsvc is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822926" version="1" comment="tomcat-lib is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822927" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822928" version="1" comment="tomcat-webapps is &lt;7.0.69-11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822929" version="1" comment="qemu-img is &lt;1.5.3-126.el7_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822930" version="1" comment="qemu-kvm is &lt;1.5.3-126.el7_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822931" version="1" comment="qemu-kvm-common is &lt;1.5.3-126.el7_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822932" version="1" comment="qemu-kvm-tools is &lt;1.5.3-126.el7_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822933" version="1" comment="bind is &lt;9.9.4-38.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822934" version="1" comment="bind-chroot is &lt;9.9.4-38.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822935" version="1" comment="bind-devel is &lt;9.9.4-38.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822936" version="1" comment="bind-libs is &lt;9.9.4-38.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822937" version="1" comment="bind-libs-lite is &lt;9.9.4-38.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822938" version="1" comment="bind-license is &lt;9.9.4-38.el7_3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822939" version="1" comment="bind-lite-devel is &lt;9.9.4-38.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822940" version="1" comment="bind-pkcs11 is &lt;9.9.4-38.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822941" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-38.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822942" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-38.el7_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822943" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-38.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822944" version="1" comment="bind-sdb is &lt;9.9.4-38.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822945" version="1" comment="bind-sdb-chroot is &lt;9.9.4-38.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822946" version="1" comment="bind-utils is &lt;9.9.4-38.el7_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822947" version="1" comment="nss is &lt;3.28.4-1.0.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822948" version="1" comment="nss-devel is &lt;3.28.4-1.0.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822949" version="1" comment="nss-pkcs11-devel is &lt;3.28.4-1.0.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822950" version="1" comment="nss-sysinit is &lt;3.28.4-1.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822951" version="1" comment="nss-tools is &lt;3.28.4-1.0.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822952" version="1" comment="nss-util is &lt;3.28.4-1.0.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822953" version="1" comment="nss-util-devel is &lt;3.28.4-1.0.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822954" version="1" comment="firefox is &lt;52.1.0-2.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822955" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.131-2.b11.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822956" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.131-2.b11.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822957" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.131-2.b11.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822958" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.131-2.b11.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822959" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.131-2.b11.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822960" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.131-2.b11.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822961" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.131-2.b11.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822962" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.131-2.b11.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822963" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.131-2.b11.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822964" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.131-2.b11.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822965" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.131-2.b11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822966" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.131-2.b11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822967" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.131-2.b11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822968" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.131-2.b11.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822969" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.131-2.b11.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822970" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.131-2.b11.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822971" version="1" comment="thunderbird is &lt;52.1.0-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822972" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.141-2.6.10.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822973" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.141-2.6.10.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822974" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.141-2.6.10.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822975" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.141-2.6.10.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822976" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.141-2.6.10.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822977" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.141-2.6.10.1.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822978" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.141-2.6.10.1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822979" version="1" comment="jasper is &lt;1.900.1-30.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822980" version="1" comment="jasper-devel is &lt;1.900.1-30.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822981" version="1" comment="jasper-libs is &lt;1.900.1-30.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822982" version="1" comment="jasper-utils is &lt;1.900.1-30.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822983" version="1" comment="ghostscript is &lt;9.07-20.el7_3.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822984" version="1" comment="ghostscript-cups is &lt;9.07-20.el7_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822985" version="1" comment="ghostscript-devel is &lt;9.07-20.el7_3.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822986" version="1" comment="ghostscript-doc is &lt;9.07-20.el7_3.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822987" version="1" comment="ghostscript-gtk is &lt;9.07-20.el7_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822988" version="1" comment="rpcbind is &lt;0.2.0-38.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822989" version="1" comment="libtirpc is &lt;0.2.4-0.8.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822990" version="1" comment="libtirpc-devel is &lt;0.2.4-0.8.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822991" version="1" comment="kdelibs is &lt;4.14.8-6.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822992" version="1" comment="kdelibs-apidocs is &lt;4.14.8-6.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822993" version="1" comment="kdelibs-common is &lt;4.14.8-6.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822994" version="1" comment="kdelibs-devel is &lt;4.14.8-6.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822995" version="1" comment="kdelibs-ktexteditor is &lt;4.14.8-6.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822996" version="1" comment="ctdb is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822997" version="1" comment="ctdb-tests is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822998" version="1" comment="libsmbclient is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009822999" version="1" comment="libsmbclient-devel is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823000" version="1" comment="libwbclient is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823001" version="1" comment="libwbclient-devel is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823002" version="1" comment="samba is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823003" version="1" comment="samba-client is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823004" version="1" comment="samba-client-libs is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823005" version="1" comment="samba-common is &lt;4.4.4-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823006" version="1" comment="samba-common-libs is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823007" version="1" comment="samba-common-tools is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823008" version="1" comment="samba-dc is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823009" version="1" comment="samba-dc-libs is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823010" version="1" comment="samba-devel is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823011" version="1" comment="samba-krb5-printing is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823012" version="1" comment="samba-libs is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823013" version="1" comment="samba-pidl is &lt;4.4.4-13.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823014" version="1" comment="samba-python is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823015" version="1" comment="samba-test is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823016" version="1" comment="samba-test-libs is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823017" version="1" comment="samba-vfs-glusterfs is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823018" version="1" comment="samba-winbind is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823019" version="1" comment="samba-winbind-clients is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823020" version="1" comment="samba-winbind-krb5-locator is &lt;4.4.4-13.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823021" version="1" comment="samba-winbind-modules is &lt;4.4.4-13.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823022" version="1" comment="ctdb is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823023" version="1" comment="ctdb-tests is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823024" version="1" comment="libsmbclient is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823025" version="1" comment="libsmbclient-devel is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823026" version="1" comment="libwbclient is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823027" version="1" comment="libwbclient-devel is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823028" version="1" comment="samba is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823029" version="1" comment="samba-client is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823030" version="1" comment="samba-client-libs is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823031" version="1" comment="samba-common is &lt;4.4.4-14.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823032" version="1" comment="samba-common-libs is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823033" version="1" comment="samba-common-tools is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823034" version="1" comment="samba-dc is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823035" version="1" comment="samba-dc-libs is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823036" version="1" comment="samba-devel is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823037" version="1" comment="samba-krb5-printing is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823038" version="1" comment="samba-libs is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823039" version="1" comment="samba-pidl is &lt;4.4.4-14.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823040" version="1" comment="samba-python is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823041" version="1" comment="samba-test is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823042" version="1" comment="samba-test-libs is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823043" version="1" comment="samba-vfs-glusterfs is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823044" version="1" comment="samba-winbind is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823045" version="1" comment="samba-winbind-clients is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823046" version="1" comment="samba-winbind-krb5-locator is &lt;4.4.4-14.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823047" version="1" comment="samba-winbind-modules is &lt;4.4.4-14.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823048" version="1" comment="kernel is &lt;3.10.0-514.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823049" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.21.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823050" version="1" comment="kernel-debug is &lt;3.10.0-514.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823053" version="1" comment="kernel-doc is &lt;3.10.0-514.21.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823054" version="1" comment="kernel-headers is &lt;3.10.0-514.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823055" version="1" comment="kernel-tools is &lt;3.10.0-514.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823056" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823058" version="1" comment="perf is &lt;3.10.0-514.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823059" version="1" comment="python-perf is &lt;3.10.0-514.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823060" version="1" comment="nss is &lt;3.28.4-1.2.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823061" version="1" comment="nss-devel is &lt;3.28.4-1.2.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823062" version="1" comment="nss-pkcs11-devel is &lt;3.28.4-1.2.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823063" version="1" comment="nss-sysinit is &lt;3.28.4-1.2.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823064" version="1" comment="nss-tools is &lt;3.28.4-1.2.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823065" version="1" comment="sudo is &lt;1.8.6p7-22.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823066" version="1" comment="sudo-devel is &lt;1.8.6p7-22.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823067" version="1" comment="qemu-img is &lt;1.5.3-126.el7_3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823068" version="1" comment="qemu-kvm is &lt;1.5.3-126.el7_3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823069" version="1" comment="qemu-kvm-common is &lt;1.5.3-126.el7_3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823070" version="1" comment="qemu-kvm-tools is &lt;1.5.3-126.el7_3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823071" version="1" comment="firefox is &lt;52.2.0-1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823072" version="1" comment="glibc is &lt;2.17-157.el7_3.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823073" version="1" comment="glibc-common is &lt;2.17-157.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823074" version="1" comment="glibc-devel is &lt;2.17-157.el7_3.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823075" version="1" comment="glibc-headers is &lt;2.17-157.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823076" version="1" comment="glibc-static is &lt;2.17-157.el7_3.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823077" version="1" comment="glibc-utils is &lt;2.17-157.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823078" version="1" comment="nscd is &lt;2.17-157.el7_3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823079" version="1" comment="kernel is &lt;3.10.0-514.21.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823080" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.21.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823081" version="1" comment="kernel-debug is &lt;3.10.0-514.21.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823084" version="1" comment="kernel-doc is &lt;3.10.0-514.21.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823085" version="1" comment="kernel-headers is &lt;3.10.0-514.21.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823086" version="1" comment="kernel-tools is &lt;3.10.0-514.21.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823087" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.21.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823089" version="1" comment="perf is &lt;3.10.0-514.21.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823090" version="1" comment="python-perf is &lt;3.10.0-514.21.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823091" version="1" comment="thunderbird is &lt;52.2.0-1.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823092" version="1" comment="sudo is &lt;1.8.6p7-23.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823093" version="1" comment="sudo-devel is &lt;1.8.6p7-23.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823094" version="1" comment="emacs-mercurial is &lt;2.6.2-7.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823095" version="1" comment="emacs-mercurial-el is &lt;2.6.2-7.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823096" version="1" comment="mercurial is &lt;2.6.2-7.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823097" version="1" comment="mercurial-hgk is &lt;2.6.2-7.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823098" version="1" comment="freeradius is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823099" version="1" comment="freeradius-devel is &lt;3.0.4-8.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823100" version="1" comment="freeradius-doc is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823101" version="1" comment="freeradius-krb5 is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823102" version="1" comment="freeradius-ldap is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823103" version="1" comment="freeradius-mysql is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823104" version="1" comment="freeradius-perl is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823105" version="1" comment="freeradius-postgresql is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823106" version="1" comment="freeradius-python is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823107" version="1" comment="freeradius-sqlite is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823108" version="1" comment="freeradius-unixODBC is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823109" version="1" comment="freeradius-utils is &lt;3.0.4-8.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823110" version="1" comment="kernel is &lt;3.10.0-514.26.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823111" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-514.26.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823112" version="1" comment="kernel-debug is &lt;3.10.0-514.26.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823115" version="1" comment="kernel-doc is &lt;3.10.0-514.26.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823116" version="1" comment="kernel-headers is &lt;3.10.0-514.26.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823117" version="1" comment="kernel-tools is &lt;3.10.0-514.26.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823118" version="1" comment="kernel-tools-libs is &lt;3.10.0-514.26.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823120" version="1" comment="perf is &lt;3.10.0-514.26.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823121" version="1" comment="python-perf is &lt;3.10.0-514.26.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823122" version="1" comment="bind is &lt;9.9.4-50.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823123" version="1" comment="bind-chroot is &lt;9.9.4-50.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823124" version="1" comment="bind-devel is &lt;9.9.4-50.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823125" version="1" comment="bind-libs is &lt;9.9.4-50.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823126" version="1" comment="bind-libs-lite is &lt;9.9.4-50.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823127" version="1" comment="bind-license is &lt;9.9.4-50.el7_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823128" version="1" comment="bind-lite-devel is &lt;9.9.4-50.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823129" version="1" comment="bind-pkcs11 is &lt;9.9.4-50.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823130" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-50.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823131" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-50.el7_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823132" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-50.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823133" version="1" comment="bind-sdb is &lt;9.9.4-50.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823134" version="1" comment="bind-sdb-chroot is &lt;9.9.4-50.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823135" version="1" comment="bind-utils is &lt;9.9.4-50.el7_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823136" version="1" comment="qemu-img is &lt;1.5.3-126.el7_3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823137" version="1" comment="qemu-kvm is &lt;1.5.3-126.el7_3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823138" version="1" comment="qemu-kvm-common is &lt;1.5.3-126.el7_3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823139" version="1" comment="qemu-kvm-tools is &lt;1.5.3-126.el7_3.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823140" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.141-1.b16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823141" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.141-1.b16.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823142" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.141-1.b16.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823143" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.141-1.b16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823144" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.141-1.b16.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823145" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.141-1.b16.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823146" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.141-1.b16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823147" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.141-1.b16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823148" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.141-1.b16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823149" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.141-1.b16.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823150" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.141-1.b16.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823151" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.141-1.b16.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823152" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.141-1.b16.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823153" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.141-1.b16.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823154" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.141-1.b16.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823155" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.141-1.b16.el7_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823156" version="1" comment="graphite2 is &lt;1.3.10-1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823157" version="1" comment="graphite2-devel is &lt;1.3.10-1.el7_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823158" version="1" comment="tomcat is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823159" version="1" comment="tomcat-admin-webapps is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823160" version="1" comment="tomcat-docs-webapp is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823161" version="1" comment="tomcat-el-2.2-api is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823162" version="1" comment="tomcat-javadoc is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823163" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823164" version="1" comment="tomcat-jsvc is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823165" version="1" comment="tomcat-lib is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823166" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823167" version="1" comment="tomcat-webapps is &lt;7.0.69-12.el7_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823168" version="1" comment="kernel is &lt;3.10.0-693.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823169" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823170" version="1" comment="kernel-debug is &lt;3.10.0-693.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823173" version="1" comment="kernel-doc is &lt;3.10.0-693.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823174" version="1" comment="kernel-headers is &lt;3.10.0-693.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823175" version="1" comment="kernel-tools is &lt;3.10.0-693.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823176" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823178" version="1" comment="perf is &lt;3.10.0-693.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823179" version="1" comment="python-perf is &lt;3.10.0-693.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823180" version="1" comment="openldap is &lt;2.4.44-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823181" version="1" comment="openldap-clients is &lt;2.4.44-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823182" version="1" comment="openldap-devel is &lt;2.4.44-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823183" version="1" comment="openldap-servers is &lt;2.4.44-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823184" version="1" comment="openldap-servers-sql is &lt;2.4.44-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823185" version="1" comment="finch is &lt;2.10.11-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823186" version="1" comment="finch-devel is &lt;2.10.11-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823187" version="1" comment="libpurple is &lt;2.10.11-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823188" version="1" comment="libpurple-devel is &lt;2.10.11-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823189" version="1" comment="libpurple-perl is &lt;2.10.11-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823190" version="1" comment="libpurple-tcl is &lt;2.10.11-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823191" version="1" comment="pidgin is &lt;2.10.11-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823192" version="1" comment="pidgin-devel is &lt;2.10.11-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823193" version="1" comment="pidgin-perl is &lt;2.10.11-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823194" version="1" comment="qemu-img is &lt;1.5.3-141.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823195" version="1" comment="qemu-kvm is &lt;1.5.3-141.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823196" version="1" comment="qemu-kvm-common is &lt;1.5.3-141.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823197" version="1" comment="qemu-kvm-tools is &lt;1.5.3-141.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823198" version="1" comment="golang is &lt;1.8.3-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823199" version="1" comment="golang-bin is &lt;1.8.3-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823200" version="1" comment="golang-docs is &lt;1.8.3-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823201" version="1" comment="golang-misc is &lt;1.8.3-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823202" version="1" comment="golang-src is &lt;1.8.3-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823203" version="1" comment="golang-tests is &lt;1.8.3-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823204" version="1" comment="libtasn1 is &lt;4.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823205" version="1" comment="libtasn1-devel is &lt;4.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823206" version="1" comment="libtasn1-tools is &lt;4.10-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823207" version="1" comment="drm-utils is &lt;2.4.74-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823208" version="1" comment="libICE is &lt;1.0.9-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823209" version="1" comment="libICE-devel is &lt;1.0.9-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823210" version="1" comment="libX11 is &lt;1.6.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823211" version="1" comment="libX11-common is &lt;1.6.5-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823212" version="1" comment="libX11-devel is &lt;1.6.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823213" version="1" comment="libXaw is &lt;1.0.13-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823214" version="1" comment="libXaw-devel is &lt;1.0.13-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823215" version="1" comment="libXcursor is &lt;1.1.14-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823216" version="1" comment="libXcursor-devel is &lt;1.1.14-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823217" version="1" comment="libXdmcp is &lt;1.1.2-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823218" version="1" comment="libXdmcp-devel is &lt;1.1.2-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823219" version="1" comment="libXfixes is &lt;5.0.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823220" version="1" comment="libXfixes-devel is &lt;5.0.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823221" version="1" comment="libXfont is &lt;1.5.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823222" version="1" comment="libXfont-devel is &lt;1.5.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823223" version="1" comment="libXfont2 is &lt;2.0.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823224" version="1" comment="libXfont2-devel is &lt;2.0.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823225" version="1" comment="libXi is &lt;1.7.9-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823226" version="1" comment="libXi-devel is &lt;1.7.9-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823227" version="1" comment="libXpm is &lt;3.5.12-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823228" version="1" comment="libXpm-devel is &lt;3.5.12-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823229" version="1" comment="libXrandr is &lt;1.5.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823230" version="1" comment="libXrandr-devel is &lt;1.5.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823231" version="1" comment="libXrender is &lt;0.9.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823232" version="1" comment="libXrender-devel is &lt;0.9.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823233" version="1" comment="libXt is &lt;1.1.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823234" version="1" comment="libXt-devel is &lt;1.1.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823235" version="1" comment="libXtst is &lt;1.2.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823236" version="1" comment="libXtst-devel is &lt;1.2.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823237" version="1" comment="libXv is &lt;1.0.11-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823238" version="1" comment="libXv-devel is &lt;1.0.11-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823239" version="1" comment="libXvMC is &lt;1.0.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823240" version="1" comment="libXvMC-devel is &lt;1.0.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823241" version="1" comment="libXxf86vm is &lt;1.1.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823242" version="1" comment="libXxf86vm-devel is &lt;1.1.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823243" version="1" comment="libdrm is &lt;2.4.74-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823244" version="1" comment="libdrm-devel is &lt;2.4.74-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823245" version="1" comment="libepoxy is &lt;1.3.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823246" version="1" comment="libepoxy-devel is &lt;1.3.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823247" version="1" comment="libevdev is &lt;1.5.6-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823248" version="1" comment="libevdev-devel is &lt;1.5.6-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823249" version="1" comment="libevdev-utils is &lt;1.5.6-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823250" version="1" comment="libfontenc is &lt;1.1.3-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823251" version="1" comment="libfontenc-devel is &lt;1.1.3-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823252" version="1" comment="libinput is &lt;1.6.3-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823253" version="1" comment="libinput-devel is &lt;1.6.3-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823254" version="1" comment="libvdpau is &lt;1.1.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823255" version="1" comment="libvdpau-devel is &lt;1.1.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823256" version="1" comment="libvdpau-docs is &lt;1.1.1-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823257" version="1" comment="libwacom is &lt;0.24-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823258" version="1" comment="libwacom-data is &lt;0.24-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823259" version="1" comment="libwacom-devel is &lt;0.24-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823260" version="1" comment="libxcb is &lt;1.12-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823261" version="1" comment="libxcb-devel is &lt;1.12-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823262" version="1" comment="libxcb-doc is &lt;1.12-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823263" version="1" comment="libxkbcommon is &lt;0.7.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823264" version="1" comment="libxkbcommon-devel is &lt;0.7.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823265" version="1" comment="libxkbcommon-x11 is &lt;0.7.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823266" version="1" comment="libxkbcommon-x11-devel is &lt;0.7.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823267" version="1" comment="libxkbfile is &lt;1.0.9-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823268" version="1" comment="libxkbfile-devel is &lt;1.0.9-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823269" version="1" comment="mesa-dri-drivers is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823270" version="1" comment="mesa-filesystem is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823271" version="1" comment="mesa-libEGL is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823272" version="1" comment="mesa-libEGL-devel is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823273" version="1" comment="mesa-libGL is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823274" version="1" comment="mesa-libGL-devel is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823275" version="1" comment="mesa-libGLES is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823276" version="1" comment="mesa-libGLES-devel is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823277" version="1" comment="mesa-libOSMesa is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823278" version="1" comment="mesa-libOSMesa-devel is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823279" version="1" comment="mesa-libgbm is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823280" version="1" comment="mesa-libgbm-devel is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823281" version="1" comment="mesa-libglapi is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823282" version="1" comment="mesa-libxatracker is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823283" version="1" comment="mesa-libxatracker-devel is &lt;17.0.1-6.20170307.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823284" version="1" comment="mesa-private-llvm is &lt;3.9.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823285" version="1" comment="mesa-private-llvm-devel is &lt;3.9.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823286" version="1" comment="mesa-vulkan-drivers is &lt;17.0.1-6.20170307.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823287" version="1" comment="vulkan is &lt;1.0.39.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823288" version="1" comment="vulkan-devel is &lt;1.0.39.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823289" version="1" comment="vulkan-filesystem is &lt;1.0.39.1-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823290" version="1" comment="xcb-proto is &lt;1.12-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823291" version="1" comment="xkeyboard-config is &lt;2.20-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823292" version="1" comment="xkeyboard-config-devel is &lt;2.20-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823293" version="1" comment="xorg-x11-proto-devel is &lt;7.7-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823294" version="1" comment="python is &lt;2.7.5-58.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823295" version="1" comment="python-debug is &lt;2.7.5-58.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823296" version="1" comment="python-devel is &lt;2.7.5-58.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823297" version="1" comment="python-libs is &lt;2.7.5-58.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823298" version="1" comment="python-test is &lt;2.7.5-58.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823299" version="1" comment="python-tools is &lt;2.7.5-58.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823300" version="1" comment="tkinter is &lt;2.7.5-58.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823301" version="1" comment="tcpdump is &lt;4.9.0-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823302" version="1" comment="glibc is &lt;2.17-196.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823303" version="1" comment="glibc-common is &lt;2.17-196.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823304" version="1" comment="glibc-devel is &lt;2.17-196.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823305" version="1" comment="glibc-headers is &lt;2.17-196.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823306" version="1" comment="glibc-static is &lt;2.17-196.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823307" version="1" comment="glibc-utils is &lt;2.17-196.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823308" version="1" comment="nscd is &lt;2.17-196.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823309" version="1" comment="bash is &lt;4.2.46-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823310" version="1" comment="bash-doc is &lt;4.2.46-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823311" version="1" comment="ctdb is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823312" version="1" comment="ctdb-tests is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823313" version="1" comment="libsmbclient is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823314" version="1" comment="libsmbclient-devel is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823315" version="1" comment="libwbclient is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823316" version="1" comment="libwbclient-devel is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823317" version="1" comment="samba is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823318" version="1" comment="samba-client is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823319" version="1" comment="samba-client-libs is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823320" version="1" comment="samba-common is &lt;4.6.2-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823321" version="1" comment="samba-common-libs is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823322" version="1" comment="samba-common-tools is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823323" version="1" comment="samba-dc is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823324" version="1" comment="samba-dc-libs is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823325" version="1" comment="samba-devel is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823326" version="1" comment="samba-krb5-printing is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823327" version="1" comment="samba-libs is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823328" version="1" comment="samba-pidl is &lt;4.6.2-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823329" version="1" comment="samba-python is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823330" version="1" comment="samba-test is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823331" version="1" comment="samba-test-libs is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823332" version="1" comment="samba-vfs-glusterfs is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823333" version="1" comment="samba-winbind is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823334" version="1" comment="samba-winbind-clients is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823335" version="1" comment="samba-winbind-krb5-locator is &lt;4.6.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823336" version="1" comment="samba-winbind-modules is &lt;4.6.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823337" version="1" comment="postgresql is &lt;9.2.21-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823338" version="1" comment="postgresql-contrib is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823339" version="1" comment="postgresql-devel is &lt;9.2.21-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823340" version="1" comment="postgresql-docs is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823341" version="1" comment="postgresql-libs is &lt;9.2.21-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823342" version="1" comment="postgresql-plperl is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823343" version="1" comment="postgresql-plpython is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823344" version="1" comment="postgresql-pltcl is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823345" version="1" comment="postgresql-server is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823346" version="1" comment="postgresql-static is &lt;9.2.21-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823347" version="1" comment="postgresql-test is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823348" version="1" comment="postgresql-upgrade is &lt;9.2.21-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823349" version="1" comment="fltk is &lt;1.3.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823350" version="1" comment="fltk-devel is &lt;1.3.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823351" version="1" comment="fltk-fluid is &lt;1.3.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823352" version="1" comment="fltk-static is &lt;1.3.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823353" version="1" comment="tigervnc is &lt;1.8.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823354" version="1" comment="tigervnc-icons is &lt;1.8.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823355" version="1" comment="tigervnc-license is &lt;1.8.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823356" version="1" comment="tigervnc-server is &lt;1.8.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823357" version="1" comment="tigervnc-server-applet is &lt;1.8.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823358" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823359" version="1" comment="tigervnc-server-module is &lt;1.8.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823360" version="1" comment="emacs-git is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823361" version="1" comment="emacs-git-el is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823362" version="1" comment="git is &lt;1.8.3.1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823363" version="1" comment="git-all is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823364" version="1" comment="git-bzr is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823365" version="1" comment="git-cvs is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823366" version="1" comment="git-daemon is &lt;1.8.3.1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823367" version="1" comment="git-email is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823368" version="1" comment="git-gui is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823369" version="1" comment="git-hg is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823370" version="1" comment="git-p4 is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823371" version="1" comment="git-svn is &lt;1.8.3.1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823372" version="1" comment="gitk is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823373" version="1" comment="gitweb is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823374" version="1" comment="perl-Git is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823375" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823376" version="1" comment="curl is &lt;7.29.0-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823377" version="1" comment="libcurl is &lt;7.29.0-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823378" version="1" comment="libcurl-devel is &lt;7.29.0-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823379" version="1" comment="openssh is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823380" version="1" comment="openssh-askpass is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823381" version="1" comment="openssh-cavs is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823382" version="1" comment="openssh-clients is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823383" version="1" comment="openssh-keycat is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823384" version="1" comment="openssh-ldap is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823385" version="1" comment="openssh-server is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823386" version="1" comment="openssh-server-sysvinit is &lt;7.4p1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823387" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-1.11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823388" version="1" comment="clutter-gst2 is &lt;2.0.18-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823389" version="1" comment="clutter-gst2-devel is &lt;2.0.18-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823390" version="1" comment="gnome-video-effects is &lt;0.4.3-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823391" version="1" comment="gstreamer-plugins-bad-free is &lt;0.10.23-23.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823392" version="1" comment="gstreamer-plugins-bad-free-devel is &lt;0.10.23-23.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823393" version="1" comment="gstreamer-plugins-bad-free-devel-docs is &lt;0.10.23-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823394" version="1" comment="gstreamer-plugins-good is &lt;0.10.31-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823395" version="1" comment="gstreamer-plugins-good-devel-docs is &lt;0.10.31-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823396" version="1" comment="gstreamer1 is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823397" version="1" comment="gstreamer1-devel is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823398" version="1" comment="gstreamer1-devel-docs is &lt;1.10.4-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823399" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823400" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823401" version="1" comment="gstreamer1-plugins-bad-free-gtk is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823402" version="1" comment="gstreamer1-plugins-base is &lt;1.10.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823403" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.10.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823404" version="1" comment="gstreamer1-plugins-base-devel-docs is &lt;1.10.4-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823405" version="1" comment="gstreamer1-plugins-base-tools is &lt;1.10.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823406" version="1" comment="gstreamer1-plugins-good is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823407" version="1" comment="orc is &lt;0.4.26-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823408" version="1" comment="orc-compiler is &lt;0.4.26-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823409" version="1" comment="orc-devel is &lt;0.4.26-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823410" version="1" comment="orc-doc is &lt;0.4.26-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823411" version="1" comment="gdm is &lt;3.22.3-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823412" version="1" comment="gdm-devel is &lt;3.22.3-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823413" version="1" comment="gnome-session is &lt;3.22.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823414" version="1" comment="gnome-session-custom-session is &lt;3.22.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823415" version="1" comment="gnome-session-xsession is &lt;3.22.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823416" version="1" comment="ghostscript is &lt;9.07-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823417" version="1" comment="ghostscript-cups is &lt;9.07-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823418" version="1" comment="ghostscript-devel is &lt;9.07-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823419" version="1" comment="ghostscript-doc is &lt;9.07-28.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823420" version="1" comment="ghostscript-gtk is &lt;9.07-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823421" version="1" comment="mariadb is &lt;5.5.56-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823422" version="1" comment="mariadb-bench is &lt;5.5.56-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823423" version="1" comment="mariadb-devel is &lt;5.5.56-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823424" version="1" comment="mariadb-embedded is &lt;5.5.56-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823425" version="1" comment="mariadb-embedded-devel is &lt;5.5.56-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823426" version="1" comment="mariadb-libs is &lt;5.5.56-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823427" version="1" comment="mariadb-server is &lt;5.5.56-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823428" version="1" comment="mariadb-test is &lt;5.5.56-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823429" version="1" comment="tomcat is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823430" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823431" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823432" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823433" version="1" comment="tomcat-javadoc is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823434" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823435" version="1" comment="tomcat-jsvc is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823436" version="1" comment="tomcat-lib is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823437" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823438" version="1" comment="tomcat-webapps is &lt;7.0.76-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823439" version="1" comment="gtk-vnc is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823440" version="1" comment="gtk-vnc-devel is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823441" version="1" comment="gtk-vnc-python is &lt;0.7.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823442" version="1" comment="gtk-vnc2 is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823443" version="1" comment="gtk-vnc2-devel is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823444" version="1" comment="gvnc is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823445" version="1" comment="gvnc-devel is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823446" version="1" comment="gvnc-tools is &lt;0.7.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823447" version="1" comment="gvncpulse is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823448" version="1" comment="gvncpulse-devel is &lt;0.7.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823449" version="1" comment="authconfig is &lt;6.2.8-30.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823450" version="1" comment="authconfig-gtk is &lt;6.2.8-30.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823451" version="1" comment="gnutls is &lt;3.3.26-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823452" version="1" comment="gnutls-c++ is &lt;3.3.26-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823453" version="1" comment="gnutls-dane is &lt;3.3.26-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823454" version="1" comment="gnutls-devel is &lt;3.3.26-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823455" version="1" comment="gnutls-utils is &lt;3.3.26-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823456" version="1" comment="NetworkManager is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823457" version="1" comment="NetworkManager-adsl is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823458" version="1" comment="NetworkManager-bluetooth is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823459" version="1" comment="NetworkManager-config-server is &lt;1.8.0-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823460" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.8.0-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823461" version="1" comment="NetworkManager-glib is &lt;1.8.0-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823462" version="1" comment="NetworkManager-glib-devel is &lt;1.8.0-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823463" version="1" comment="NetworkManager-libnm is &lt;1.8.0-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823464" version="1" comment="NetworkManager-libnm-devel is &lt;1.8.0-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823465" version="1" comment="NetworkManager-libreswan is &lt;1.2.4-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823466" version="1" comment="NetworkManager-libreswan-gnome is &lt;1.2.4-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823467" version="1" comment="NetworkManager-ppp is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823468" version="1" comment="NetworkManager-team is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823469" version="1" comment="NetworkManager-tui is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823470" version="1" comment="NetworkManager-wifi is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823471" version="1" comment="NetworkManager-wwan is &lt;1.8.0-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823472" version="1" comment="libnl3 is &lt;3.2.28-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823473" version="1" comment="libnl3-cli is &lt;3.2.28-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823474" version="1" comment="libnl3-devel is &lt;3.2.28-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823475" version="1" comment="libnl3-doc is &lt;3.2.28-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823476" version="1" comment="libnm-gtk is &lt;1.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823477" version="1" comment="libnm-gtk-devel is &lt;1.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823478" version="1" comment="libnma is &lt;1.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823479" version="1" comment="libnma-devel is &lt;1.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823480" version="1" comment="network-manager-applet is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823481" version="1" comment="nm-connection-editor is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823482" version="1" comment="pki-base is &lt;10.4.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823483" version="1" comment="pki-base-java is &lt;10.4.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823484" version="1" comment="pki-ca is &lt;10.4.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823485" version="1" comment="pki-javadoc is &lt;10.4.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823486" version="1" comment="pki-kra is &lt;10.4.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823487" version="1" comment="pki-server is &lt;10.4.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823488" version="1" comment="pki-symkey is &lt;10.4.1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823489" version="1" comment="pki-tools is &lt;10.4.1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823490" version="1" comment="evince is &lt;3.22.1-5.2.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823491" version="1" comment="evince-browser-plugin is &lt;3.22.1-5.2.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823492" version="1" comment="evince-devel is &lt;3.22.1-5.2.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823493" version="1" comment="evince-dvi is &lt;3.22.1-5.2.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823494" version="1" comment="evince-libs is &lt;3.22.1-5.2.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823495" version="1" comment="evince-nautilus is &lt;3.22.1-5.2.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823496" version="1" comment="freeradius is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823497" version="1" comment="freeradius-devel is &lt;3.0.13-8.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823498" version="1" comment="freeradius-doc is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823499" version="1" comment="freeradius-krb5 is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823500" version="1" comment="freeradius-ldap is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823501" version="1" comment="freeradius-mysql is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823502" version="1" comment="freeradius-perl is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823503" version="1" comment="freeradius-postgresql is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823504" version="1" comment="freeradius-python is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823505" version="1" comment="freeradius-sqlite is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823506" version="1" comment="freeradius-unixODBC is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823507" version="1" comment="freeradius-utils is &lt;3.0.13-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823508" version="1" comment="log4j is &lt;1.2.17-16.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823509" version="1" comment="log4j-javadoc is &lt;1.2.17-16.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823510" version="1" comment="log4j-manual is &lt;1.2.17-16.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823511" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.151-2.6.11.1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823512" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.151-2.6.11.1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823513" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.151-2.6.11.1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823514" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.151-2.6.11.1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823515" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.151-2.6.11.1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823516" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.151-2.6.11.1.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823517" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.151-2.6.11.1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823518" version="1" comment="qemu-img is &lt;1.5.3-141.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823519" version="1" comment="qemu-kvm is &lt;1.5.3-141.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823520" version="1" comment="qemu-kvm-common is &lt;1.5.3-141.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823521" version="1" comment="qemu-kvm-tools is &lt;1.5.3-141.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823522" version="1" comment="firefox is &lt;52.3.0-2.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823523" version="1" comment="libsoup is &lt;2.56.0-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823524" version="1" comment="libsoup-devel is &lt;2.56.0-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823525" version="1" comment="spice-server is &lt;0.12.8-2.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823526" version="1" comment="spice-server-devel is &lt;0.12.8-2.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823527" version="1" comment="kernel is &lt;3.10.0-693.1.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823528" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.1.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823529" version="1" comment="kernel-debug is &lt;3.10.0-693.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823532" version="1" comment="kernel-doc is &lt;3.10.0-693.1.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823533" version="1" comment="kernel-headers is &lt;3.10.0-693.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823534" version="1" comment="kernel-tools is &lt;3.10.0-693.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823535" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823537" version="1" comment="perf is &lt;3.10.0-693.1.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823538" version="1" comment="python-perf is &lt;3.10.0-693.1.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823539" version="1" comment="httpd is &lt;2.4.6-67.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823540" version="1" comment="httpd-devel is &lt;2.4.6-67.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823541" version="1" comment="httpd-manual is &lt;2.4.6-67.el7_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823542" version="1" comment="httpd-tools is &lt;2.4.6-67.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823543" version="1" comment="mod_ldap is &lt;2.4.6-67.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823544" version="1" comment="mod_proxy_html is &lt;2.4.6-67.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823545" version="1" comment="mod_session is &lt;2.4.6-67.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823546" version="1" comment="mod_ssl is &lt;2.4.6-67.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823547" version="1" comment="mod_dav_svn is &lt;1.7.14-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823548" version="1" comment="subversion is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823549" version="1" comment="subversion-devel is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823550" version="1" comment="subversion-gnome is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823551" version="1" comment="subversion-javahl is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823552" version="1" comment="subversion-kde is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823553" version="1" comment="subversion-libs is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823554" version="1" comment="subversion-perl is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823555" version="1" comment="subversion-python is &lt;1.7.14-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823556" version="1" comment="subversion-ruby is &lt;1.7.14-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823557" version="1" comment="subversion-tools is &lt;1.7.14-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823558" version="1" comment="emacs-git is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823559" version="1" comment="emacs-git-el is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823560" version="1" comment="git is &lt;1.8.3.1-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823561" version="1" comment="git-all is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823562" version="1" comment="git-bzr is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823563" version="1" comment="git-cvs is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823564" version="1" comment="git-daemon is &lt;1.8.3.1-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823565" version="1" comment="git-email is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823566" version="1" comment="git-gui is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823567" version="1" comment="git-hg is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823568" version="1" comment="git-p4 is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823569" version="1" comment="git-svn is &lt;1.8.3.1-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823570" version="1" comment="gitk is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823571" version="1" comment="gitweb is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823572" version="1" comment="perl-Git is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823573" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823574" version="1" comment="groovy is &lt;1.8.9-8.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823575" version="1" comment="groovy-javadoc is &lt;1.8.9-8.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823576" version="1" comment="emacs-mercurial is &lt;2.6.2-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823577" version="1" comment="emacs-mercurial-el is &lt;2.6.2-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823578" version="1" comment="mercurial is &lt;2.6.2-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823579" version="1" comment="mercurial-hgk is &lt;2.6.2-8.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823580" version="1" comment="xmlsec1 is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823581" version="1" comment="xmlsec1-devel is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823582" version="1" comment="xmlsec1-gcrypt is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823583" version="1" comment="xmlsec1-gcrypt-devel is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823584" version="1" comment="xmlsec1-gnutls is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823585" version="1" comment="xmlsec1-gnutls-devel is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823586" version="1" comment="xmlsec1-nss is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823587" version="1" comment="xmlsec1-nss-devel is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823588" version="1" comment="xmlsec1-openssl is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823589" version="1" comment="xmlsec1-openssl-devel is &lt;1.2.20-7.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823590" version="1" comment="thunderbird is &lt;52.3.0-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823591" version="1" comment="poppler is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823592" version="1" comment="poppler-cpp is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823593" version="1" comment="poppler-cpp-devel is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823594" version="1" comment="poppler-demos is &lt;0.26.5-17.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823595" version="1" comment="poppler-devel is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823596" version="1" comment="poppler-glib is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823597" version="1" comment="poppler-glib-devel is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823598" version="1" comment="poppler-qt is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823599" version="1" comment="poppler-qt-devel is &lt;0.26.5-17.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823600" version="1" comment="poppler-utils is &lt;0.26.5-17.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823601" version="1" comment="kernel is &lt;3.10.0-693.2.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823602" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.2.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823603" version="1" comment="kernel-debug is &lt;3.10.0-693.2.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823606" version="1" comment="kernel-doc is &lt;3.10.0-693.2.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823607" version="1" comment="kernel-headers is &lt;3.10.0-693.2.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823608" version="1" comment="kernel-tools is &lt;3.10.0-693.2.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823609" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.2.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823611" version="1" comment="perf is &lt;3.10.0-693.2.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823612" version="1" comment="python-perf is &lt;3.10.0-693.2.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823613" version="1" comment="bluez is &lt;5.44-4.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823614" version="1" comment="bluez-cups is &lt;5.44-4.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823615" version="1" comment="bluez-hid2hci is &lt;5.44-4.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823616" version="1" comment="bluez-libs is &lt;5.44-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823617" version="1" comment="bluez-libs-devel is &lt;5.44-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823618" version="1" comment="postgresql is &lt;9.2.23-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823619" version="1" comment="postgresql-contrib is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823620" version="1" comment="postgresql-devel is &lt;9.2.23-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823621" version="1" comment="postgresql-docs is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823622" version="1" comment="postgresql-libs is &lt;9.2.23-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823623" version="1" comment="postgresql-plperl is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823624" version="1" comment="postgresql-plpython is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823625" version="1" comment="postgresql-pltcl is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823626" version="1" comment="postgresql-server is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823627" version="1" comment="postgresql-static is &lt;9.2.23-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823628" version="1" comment="postgresql-test is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823629" version="1" comment="postgresql-upgrade is &lt;9.2.23-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823630" version="1" comment="emacs is &lt;24.3-20.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823631" version="1" comment="emacs-common is &lt;24.3-20.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823632" version="1" comment="emacs-el is &lt;24.3-20.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823633" version="1" comment="emacs-filesystem is &lt;24.3-20.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823634" version="1" comment="emacs-nox is &lt;24.3-20.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823635" version="1" comment="emacs-terminal is &lt;24.3-20.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823636" version="1" comment="augeas is &lt;1.4.0-2.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823637" version="1" comment="augeas-devel is &lt;1.4.0-2.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823638" version="1" comment="augeas-libs is &lt;1.4.0-2.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823639" version="1" comment="ctdb is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823640" version="1" comment="ctdb-tests is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823641" version="1" comment="libsmbclient is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823642" version="1" comment="libsmbclient-devel is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823643" version="1" comment="libwbclient is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823644" version="1" comment="libwbclient-devel is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823645" version="1" comment="samba is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823646" version="1" comment="samba-client is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823647" version="1" comment="samba-client-libs is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823648" version="1" comment="samba-common is &lt;4.6.2-11.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823649" version="1" comment="samba-common-libs is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823650" version="1" comment="samba-common-tools is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823651" version="1" comment="samba-dc is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823652" version="1" comment="samba-dc-libs is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823653" version="1" comment="samba-devel is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823654" version="1" comment="samba-krb5-printing is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823655" version="1" comment="samba-libs is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823656" version="1" comment="samba-pidl is &lt;4.6.2-11.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823657" version="1" comment="samba-python is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823658" version="1" comment="samba-test is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823659" version="1" comment="samba-test-libs is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823660" version="1" comment="samba-vfs-glusterfs is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823661" version="1" comment="samba-winbind is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823662" version="1" comment="samba-winbind-clients is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823663" version="1" comment="samba-winbind-krb5-locator is &lt;4.6.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823664" version="1" comment="samba-winbind-modules is &lt;4.6.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823665" version="1" comment="firefox is &lt;52.4.0-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823666" version="1" comment="nss is &lt;3.28.4-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823667" version="1" comment="nss-devel is &lt;3.28.4-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823668" version="1" comment="nss-pkcs11-devel is &lt;3.28.4-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823669" version="1" comment="nss-sysinit is &lt;3.28.4-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823670" version="1" comment="nss-tools is &lt;3.28.4-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823671" version="1" comment="dnsmasq is &lt;2.76-2.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823672" version="1" comment="dnsmasq-utils is &lt;2.76-2.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823673" version="1" comment="httpd is &lt;2.4.6-67.el7_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823674" version="1" comment="httpd-devel is &lt;2.4.6-67.el7_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823675" version="1" comment="httpd-manual is &lt;2.4.6-67.el7_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823676" version="1" comment="httpd-tools is &lt;2.4.6-67.el7_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823677" version="1" comment="mod_ldap is &lt;2.4.6-67.el7_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823678" version="1" comment="mod_proxy_html is &lt;2.4.6-67.el7_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823679" version="1" comment="mod_session is &lt;2.4.6-67.el7_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823680" version="1" comment="mod_ssl is &lt;2.4.6-67.el7_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823681" version="1" comment="thunderbird is &lt;52.4.0-2.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823682" version="1" comment="wpa_supplicant is &lt;2.6-5.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823683" version="1" comment="kernel is &lt;3.10.0-693.5.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823684" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.5.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823685" version="1" comment="kernel-debug is &lt;3.10.0-693.5.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823688" version="1" comment="kernel-doc is &lt;3.10.0-693.5.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823689" version="1" comment="kernel-headers is &lt;3.10.0-693.5.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823690" version="1" comment="kernel-tools is &lt;3.10.0-693.5.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823691" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.5.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823693" version="1" comment="perf is &lt;3.10.0-693.5.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823694" version="1" comment="python-perf is &lt;3.10.0-693.5.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823695" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823696" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823697" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823698" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823699" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823700" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823701" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823702" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823703" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823704" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823705" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.151-1.b12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823706" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.151-1.b12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823707" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.151-1.b12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823708" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.151-1.b12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823709" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823710" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.151-1.b12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823711" version="1" comment="wget is &lt;1.14-15.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823712" version="1" comment="tomcat is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823713" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823714" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823715" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823716" version="1" comment="tomcat-javadoc is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823717" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823718" version="1" comment="tomcat-jsvc is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823719" version="1" comment="tomcat-lib is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823720" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823721" version="1" comment="tomcat-webapps is &lt;7.0.76-3.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823722" version="1" comment="liblouis is &lt;2.5.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823723" version="1" comment="liblouis-devel is &lt;2.5.2-11.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823724" version="1" comment="liblouis-doc is &lt;2.5.2-11.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823725" version="1" comment="liblouis-python is &lt;2.5.2-11.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823726" version="1" comment="liblouis-utils is &lt;2.5.2-11.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823727" version="1" comment="php is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823728" version="1" comment="php-bcmath is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823729" version="1" comment="php-cli is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823730" version="1" comment="php-common is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823731" version="1" comment="php-dba is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823732" version="1" comment="php-devel is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823733" version="1" comment="php-embedded is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823734" version="1" comment="php-enchant is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823735" version="1" comment="php-fpm is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823736" version="1" comment="php-gd is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823737" version="1" comment="php-intl is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823738" version="1" comment="php-ldap is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823739" version="1" comment="php-mbstring is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823740" version="1" comment="php-mysql is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823741" version="1" comment="php-mysqlnd is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823742" version="1" comment="php-odbc is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823743" version="1" comment="php-pdo is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823744" version="1" comment="php-pgsql is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823745" version="1" comment="php-process is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823746" version="1" comment="php-pspell is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823747" version="1" comment="php-recode is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823748" version="1" comment="php-snmp is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823749" version="1" comment="php-soap is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823750" version="1" comment="php-xml is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823751" version="1" comment="php-xmlrpc is &lt;5.4.16-43.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823752" version="1" comment="firefox is &lt;52.5.0-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823753" version="1" comment="ctdb is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823754" version="1" comment="ctdb-tests is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823755" version="1" comment="libsmbclient is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823756" version="1" comment="libsmbclient-devel is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823757" version="1" comment="libwbclient is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823758" version="1" comment="libwbclient-devel is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823759" version="1" comment="samba is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823760" version="1" comment="samba-client is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823761" version="1" comment="samba-client-libs is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823762" version="1" comment="samba-common is &lt;4.6.2-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823763" version="1" comment="samba-common-libs is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823764" version="1" comment="samba-common-tools is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823765" version="1" comment="samba-dc is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823766" version="1" comment="samba-dc-libs is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823767" version="1" comment="samba-devel is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823768" version="1" comment="samba-krb5-printing is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823769" version="1" comment="samba-libs is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823770" version="1" comment="samba-pidl is &lt;4.6.2-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823771" version="1" comment="samba-python is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823772" version="1" comment="samba-test is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823773" version="1" comment="samba-test-libs is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823774" version="1" comment="samba-vfs-glusterfs is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823775" version="1" comment="samba-winbind is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823776" version="1" comment="samba-winbind-clients is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823777" version="1" comment="samba-winbind-krb5-locator is &lt;4.6.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823778" version="1" comment="samba-winbind-modules is &lt;4.6.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823779" version="1" comment="curl is &lt;7.29.0-42.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823780" version="1" comment="libcurl is &lt;7.29.0-42.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823781" version="1" comment="libcurl-devel is &lt;7.29.0-42.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823782" version="1" comment="procmail is &lt;3.22-36.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823783" version="1" comment="apr is &lt;1.4.8-3.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823784" version="1" comment="apr-devel is &lt;1.4.8-3.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823785" version="1" comment="kernel is &lt;3.10.0-693.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823786" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.11.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823787" version="1" comment="kernel-debug is &lt;3.10.0-693.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823790" version="1" comment="kernel-doc is &lt;3.10.0-693.11.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823791" version="1" comment="kernel-headers is &lt;3.10.0-693.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823792" version="1" comment="kernel-tools is &lt;3.10.0-693.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823793" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823795" version="1" comment="perf is &lt;3.10.0-693.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823796" version="1" comment="python-perf is &lt;3.10.0-693.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823797" version="1" comment="qemu-img is &lt;1.5.3-141.el7_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823798" version="1" comment="qemu-kvm is &lt;1.5.3-141.el7_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823799" version="1" comment="qemu-kvm-common is &lt;1.5.3-141.el7_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823800" version="1" comment="qemu-kvm-tools is &lt;1.5.3-141.el7_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823801" version="1" comment="thunderbird is &lt;52.5.0-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823802" version="1" comment="libipa_hbac is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823803" version="1" comment="libipa_hbac-devel is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823804" version="1" comment="libsss_autofs is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823805" version="1" comment="libsss_certmap is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823806" version="1" comment="libsss_certmap-devel is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823807" version="1" comment="libsss_idmap is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823808" version="1" comment="libsss_idmap-devel is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823809" version="1" comment="libsss_nss_idmap is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823810" version="1" comment="libsss_nss_idmap-devel is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823811" version="1" comment="libsss_simpleifp is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823812" version="1" comment="libsss_simpleifp-devel is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823813" version="1" comment="libsss_sudo is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823814" version="1" comment="python-libipa_hbac is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823815" version="1" comment="python-libsss_nss_idmap is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823816" version="1" comment="python-sss is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823817" version="1" comment="python-sss-murmur is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823818" version="1" comment="python-sssdconfig is &lt;1.15.2-50.el7_4.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823819" version="1" comment="sssd is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823820" version="1" comment="sssd-ad is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823821" version="1" comment="sssd-client is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823822" version="1" comment="sssd-common is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823823" version="1" comment="sssd-common-pac is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823824" version="1" comment="sssd-dbus is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823825" version="1" comment="sssd-ipa is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823826" version="1" comment="sssd-kcm is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823827" version="1" comment="sssd-krb5 is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823828" version="1" comment="sssd-krb5-common is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823829" version="1" comment="sssd-ldap is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823830" version="1" comment="sssd-libwbclient is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823831" version="1" comment="sssd-libwbclient-devel is &lt;1.15.2-50.el7_4.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823832" version="1" comment="sssd-polkit-rules is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823833" version="1" comment="sssd-proxy is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823834" version="1" comment="sssd-tools is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823835" version="1" comment="sssd-winbind-idmap is &lt;1.15.2-50.el7_4.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823836" version="1" comment="firefox is &lt;52.5.1-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823837" version="1" comment="liblouis is &lt;2.5.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823838" version="1" comment="liblouis-devel is &lt;2.5.2-12.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823839" version="1" comment="liblouis-doc is &lt;2.5.2-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823840" version="1" comment="liblouis-python is &lt;2.5.2-12.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823841" version="1" comment="liblouis-utils is &lt;2.5.2-12.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823842" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.161-2.6.12.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823843" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.161-2.6.12.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823844" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.161-2.6.12.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823845" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.161-2.6.12.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823846" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.161-2.6.12.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823847" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.161-2.6.12.0.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823848" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.161-2.6.12.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823849" version="1" comment="postgresql is &lt;9.2.23-3.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823850" version="1" comment="postgresql-contrib is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823851" version="1" comment="postgresql-devel is &lt;9.2.23-3.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823852" version="1" comment="postgresql-docs is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823853" version="1" comment="postgresql-libs is &lt;9.2.23-3.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823854" version="1" comment="postgresql-plperl is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823855" version="1" comment="postgresql-plpython is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823856" version="1" comment="postgresql-pltcl is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823857" version="1" comment="postgresql-server is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823858" version="1" comment="postgresql-static is &lt;9.2.23-3.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823859" version="1" comment="postgresql-test is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823860" version="1" comment="postgresql-upgrade is &lt;9.2.23-3.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823861" version="1" comment="kernel is &lt;3.10.0-693.11.6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823862" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.11.6.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823863" version="1" comment="kernel-debug is &lt;3.10.0-693.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823866" version="1" comment="kernel-doc is &lt;3.10.0-693.11.6.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823867" version="1" comment="kernel-headers is &lt;3.10.0-693.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823868" version="1" comment="kernel-tools is &lt;3.10.0-693.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823869" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823871" version="1" comment="perf is &lt;3.10.0-693.11.6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823872" version="1" comment="python-perf is &lt;3.10.0-693.11.6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823873" version="1" comment="microcode_ctl is &lt;2.1-22.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823874" version="1" comment="iwl100-firmware is &lt;39.31.5.1-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823875" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823876" version="1" comment="iwl105-firmware is &lt;18.168.6.1-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823877" version="1" comment="iwl135-firmware is &lt;18.168.6.1-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823878" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823879" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823880" version="1" comment="iwl3160-firmware is &lt;22.0.7.0-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823881" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823882" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823883" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823884" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823885" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823886" version="1" comment="iwl6000g2a-firmware is &lt;17.168.5.3-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823887" version="1" comment="iwl6000g2b-firmware is &lt;17.168.5.2-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823888" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823889" version="1" comment="iwl7260-firmware is &lt;22.0.7.0-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823890" version="1" comment="iwl7265-firmware is &lt;22.0.7.0-57.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823891" version="1" comment="linux-firmware is &lt;20170606-57.gitc990aae.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823892" version="1" comment="qemu-img is &lt;1.5.3-141.el7_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823893" version="1" comment="qemu-kvm is &lt;1.5.3-141.el7_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823894" version="1" comment="qemu-kvm-common is &lt;1.5.3-141.el7_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823895" version="1" comment="qemu-kvm-tools is &lt;1.5.3-141.el7_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823896" version="1" comment="libvirt-admin is &lt;3.2.0-14.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823897" version="1" comment="libvirt-daemon-lxc is &lt;3.2.0-14.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823898" version="1" comment="libvirt-lock-sanlock is &lt;3.2.0-14.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823899" version="1" comment="libvirt-login-shell is &lt;3.2.0-14.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823900" version="1" comment="libvirt-nss is &lt;3.2.0-14.el7_4.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823901" version="1" comment="thunderbird is &lt;52.5.2-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823902" version="1" comment="microcode_ctl is &lt;2.1-22.5.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823903" version="1" comment="iwl100-firmware is &lt;39.31.5.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823904" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823905" version="1" comment="iwl105-firmware is &lt;18.168.6.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823906" version="1" comment="iwl135-firmware is &lt;18.168.6.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823907" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823908" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823909" version="1" comment="iwl3160-firmware is &lt;22.0.7.0-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823910" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823911" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823912" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823913" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823914" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823915" version="1" comment="iwl6000g2a-firmware is &lt;17.168.5.3-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823916" version="1" comment="iwl6000g2b-firmware is &lt;17.168.5.2-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823917" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823918" version="1" comment="iwl7260-firmware is &lt;22.0.7.0-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823919" version="1" comment="iwl7265-firmware is &lt;22.0.7.0-58.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823920" version="1" comment="linux-firmware is &lt;20170606-58.gitc990aae.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823921" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823922" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823923" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823924" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823925" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823926" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823927" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823928" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823929" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823930" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823931" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.161-0.b14.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823932" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.161-0.b14.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823933" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.161-0.b14.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823934" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.161-0.b14.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823935" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823936" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.161-0.b14.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823937" version="1" comment="bind is &lt;9.9.4-51.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823938" version="1" comment="bind-chroot is &lt;9.9.4-51.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823939" version="1" comment="bind-devel is &lt;9.9.4-51.el7_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823940" version="1" comment="bind-libs is &lt;9.9.4-51.el7_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823941" version="1" comment="bind-libs-lite is &lt;9.9.4-51.el7_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823942" version="1" comment="bind-license is &lt;9.9.4-51.el7_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823943" version="1" comment="bind-lite-devel is &lt;9.9.4-51.el7_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823944" version="1" comment="bind-pkcs11 is &lt;9.9.4-51.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823945" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-51.el7_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823946" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-51.el7_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823947" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-51.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823948" version="1" comment="bind-sdb is &lt;9.9.4-51.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823949" version="1" comment="bind-sdb-chroot is &lt;9.9.4-51.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823950" version="1" comment="bind-utils is &lt;9.9.4-51.el7_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823951" version="1" comment="firefox is &lt;52.6.0-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823952" version="1" comment="kernel is &lt;3.10.0-693.17.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823953" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.17.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823954" version="1" comment="kernel-debug is &lt;3.10.0-693.17.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823957" version="1" comment="kernel-doc is &lt;3.10.0-693.17.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823958" version="1" comment="kernel-headers is &lt;3.10.0-693.17.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823959" version="1" comment="kernel-tools is &lt;3.10.0-693.17.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823960" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.17.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823962" version="1" comment="perf is &lt;3.10.0-693.17.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823963" version="1" comment="python-perf is &lt;3.10.0-693.17.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823964" version="1" comment="dhclient is &lt;4.2.5-58.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823965" version="1" comment="dhcp is &lt;4.2.5-58.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823966" version="1" comment="dhcp-common is &lt;4.2.5-58.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823967" version="1" comment="dhcp-devel is &lt;4.2.5-58.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823968" version="1" comment="dhcp-libs is &lt;4.2.5-58.el7_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823969" version="1" comment="389-ds-base is &lt;1.3.6.1-26.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823970" version="1" comment="389-ds-base-devel is &lt;1.3.6.1-26.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823971" version="1" comment="389-ds-base-libs is &lt;1.3.6.1-26.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823972" version="1" comment="389-ds-base-snmp is &lt;1.3.6.1-26.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823973" version="1" comment="nautilus is &lt;3.22.3-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823974" version="1" comment="nautilus-devel is &lt;3.22.3-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823975" version="1" comment="nautilus-extensions is &lt;3.22.3-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823976" version="1" comment="libgudev1 is &lt;219-42.el7_4.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823977" version="1" comment="libgudev1-devel is &lt;219-42.el7_4.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823978" version="1" comment="systemd is &lt;219-42.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823979" version="1" comment="systemd-devel is &lt;219-42.el7_4.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823980" version="1" comment="systemd-journal-gateway is &lt;219-42.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823981" version="1" comment="systemd-libs is &lt;219-42.el7_4.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823982" version="1" comment="systemd-networkd is &lt;219-42.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823983" version="1" comment="systemd-python is &lt;219-42.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823984" version="1" comment="systemd-resolved is &lt;219-42.el7_4.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823985" version="1" comment="systemd-sysv is &lt;219-42.el7_4.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823986" version="1" comment="thunderbird is &lt;52.6.0-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823987" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.171-2.6.13.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823988" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.171-2.6.13.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823989" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.171-2.6.13.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823990" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.171-2.6.13.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823991" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.171-2.6.13.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823992" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.171-2.6.13.0.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823993" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.171-2.6.13.0.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823994" version="1" comment="gcab is &lt;0.7-4.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823995" version="1" comment="libgcab1 is &lt;0.7-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823996" version="1" comment="libgcab1-devel is &lt;0.7-4.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823997" version="1" comment="quagga is &lt;0.99.22.4-5.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823998" version="1" comment="quagga-contrib is &lt;0.99.22.4-5.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009823999" version="1" comment="quagga-devel is &lt;0.99.22.4-5.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824000" version="1" comment="ruby is &lt;2.0.0.648-33.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824001" version="1" comment="ruby-devel is &lt;2.0.0.648-33.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824002" version="1" comment="ruby-doc is &lt;2.0.0.648-33.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824003" version="1" comment="ruby-irb is &lt;2.0.0.648-33.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824004" version="1" comment="ruby-libs is &lt;2.0.0.648-33.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824005" version="1" comment="ruby-tcltk is &lt;2.0.0.648-33.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824006" version="1" comment="rubygem-bigdecimal is &lt;1.2.0-33.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824007" version="1" comment="rubygem-io-console is &lt;0.4.2-33.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824008" version="1" comment="rubygem-json is &lt;1.7.7-33.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824009" version="1" comment="rubygem-minitest is &lt;4.3.2-33.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824010" version="1" comment="rubygem-psych is &lt;2.0.0-33.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824011" version="1" comment="rubygem-rake is &lt;0.9.6-33.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824012" version="1" comment="rubygem-rdoc is &lt;4.0.0-33.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824013" version="1" comment="rubygems is &lt;2.0.14.1-33.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824014" version="1" comment="rubygems-devel is &lt;2.0.14.1-33.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824015" version="1" comment="kernel is &lt;3.10.0-693.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824016" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-693.21.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824017" version="1" comment="kernel-debug is &lt;3.10.0-693.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824020" version="1" comment="kernel-doc is &lt;3.10.0-693.21.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824021" version="1" comment="kernel-headers is &lt;3.10.0-693.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824022" version="1" comment="kernel-tools is &lt;3.10.0-693.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824023" version="1" comment="kernel-tools-libs is &lt;3.10.0-693.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824025" version="1" comment="perf is &lt;3.10.0-693.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824026" version="1" comment="python-perf is &lt;3.10.0-693.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824027" version="1" comment="php is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824028" version="1" comment="php-bcmath is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824029" version="1" comment="php-cli is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824030" version="1" comment="php-common is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824031" version="1" comment="php-dba is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824032" version="1" comment="php-devel is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824033" version="1" comment="php-embedded is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824034" version="1" comment="php-enchant is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824035" version="1" comment="php-fpm is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824036" version="1" comment="php-gd is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824037" version="1" comment="php-intl is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824038" version="1" comment="php-ldap is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824039" version="1" comment="php-mbstring is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824040" version="1" comment="php-mysql is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824041" version="1" comment="php-mysqlnd is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824042" version="1" comment="php-odbc is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824043" version="1" comment="php-pdo is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824044" version="1" comment="php-pgsql is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824045" version="1" comment="php-process is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824046" version="1" comment="php-pspell is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824047" version="1" comment="php-recode is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824048" version="1" comment="php-snmp is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824049" version="1" comment="php-soap is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824050" version="1" comment="php-xml is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824051" version="1" comment="php-xmlrpc is &lt;5.4.16-43.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824052" version="1" comment="389-ds-base is &lt;1.3.6.1-28.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824053" version="1" comment="389-ds-base-devel is &lt;1.3.6.1-28.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824054" version="1" comment="389-ds-base-libs is &lt;1.3.6.1-28.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824055" version="1" comment="389-ds-base-snmp is &lt;1.3.6.1-28.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824056" version="1" comment="dhclient is &lt;4.2.5-58.el7_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824057" version="1" comment="dhcp is &lt;4.2.5-58.el7_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824058" version="1" comment="dhcp-common is &lt;4.2.5-58.el7_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824059" version="1" comment="dhcp-devel is &lt;4.2.5-58.el7_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824060" version="1" comment="dhcp-libs is &lt;4.2.5-58.el7_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824061" version="1" comment="mailman is &lt;2.1.15-26.el7_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824062" version="1" comment="firefox is &lt;52.7.0-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824063" version="1" comment="firefox is &lt;52.7.2-1.el7_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824064" version="1" comment="slf4j is &lt;1.7.4-4.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824065" version="1" comment="slf4j-javadoc is &lt;1.7.4-4.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824066" version="1" comment="slf4j-manual is &lt;1.7.4-4.el7_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824067" version="1" comment="thunderbird is &lt;52.7.0-1.el7_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824068" version="1" comment="krb5-devel is &lt;1.15.1-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824069" version="1" comment="krb5-libs is &lt;1.15.1-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824070" version="1" comment="krb5-pkinit is &lt;1.15.1-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824071" version="1" comment="krb5-server is &lt;1.15.1-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824072" version="1" comment="krb5-server-ldap is &lt;1.15.1-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824073" version="1" comment="krb5-workstation is &lt;1.15.1-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824074" version="1" comment="libkadm5 is &lt;1.15.1-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824075" version="1" comment="glibc is &lt;2.17-222.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824076" version="1" comment="glibc-common is &lt;2.17-222.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824077" version="1" comment="glibc-devel is &lt;2.17-222.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824078" version="1" comment="glibc-headers is &lt;2.17-222.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824079" version="1" comment="glibc-static is &lt;2.17-222.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824080" version="1" comment="glibc-utils is &lt;2.17-222.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824081" version="1" comment="nscd is &lt;2.17-222.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824082" version="1" comment="qemu-img is &lt;1.5.3-156.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824083" version="1" comment="qemu-kvm is &lt;1.5.3-156.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824084" version="1" comment="qemu-kvm-common is &lt;1.5.3-156.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824085" version="1" comment="qemu-kvm-tools is &lt;1.5.3-156.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824086" version="1" comment="xdg-user-dirs is &lt;0.15-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824087" version="1" comment="cpp is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824088" version="1" comment="gcc is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824089" version="1" comment="gcc-c++ is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824090" version="1" comment="gcc-gfortran is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824091" version="1" comment="gcc-gnat is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824092" version="1" comment="gcc-go is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824093" version="1" comment="gcc-objc is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824094" version="1" comment="gcc-objc++ is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824095" version="1" comment="gcc-plugin-devel is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824096" version="1" comment="libasan is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824097" version="1" comment="libasan-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824098" version="1" comment="libatomic is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824099" version="1" comment="libatomic-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824100" version="1" comment="libgcc is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824101" version="1" comment="libgfortran is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824102" version="1" comment="libgfortran-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824103" version="1" comment="libgnat is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824104" version="1" comment="libgnat-devel is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824105" version="1" comment="libgnat-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824106" version="1" comment="libgo is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824107" version="1" comment="libgo-devel is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824108" version="1" comment="libgo-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824109" version="1" comment="libgomp is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824110" version="1" comment="libitm is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824111" version="1" comment="libitm-devel is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824112" version="1" comment="libitm-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824113" version="1" comment="libmudflap is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824114" version="1" comment="libmudflap-devel is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824115" version="1" comment="libmudflap-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824116" version="1" comment="libobjc is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824117" version="1" comment="libquadmath is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824118" version="1" comment="libquadmath-devel is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824119" version="1" comment="libquadmath-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824120" version="1" comment="libstdc++ is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824121" version="1" comment="libstdc++-devel is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824122" version="1" comment="libstdc++-docs is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824123" version="1" comment="libstdc++-static is &lt;4.8.5-28.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824124" version="1" comment="libtsan is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824125" version="1" comment="libtsan-static is &lt;4.8.5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824126" version="1" comment="ntp is &lt;4.2.6p5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824127" version="1" comment="ntp-doc is &lt;4.2.6p5-28.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824128" version="1" comment="ntp-perl is &lt;4.2.6p5-28.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824129" version="1" comment="ntpdate is &lt;4.2.6p5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824130" version="1" comment="sntp is &lt;4.2.6p5-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824131" version="1" comment="golang is &lt;1.9.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824132" version="1" comment="golang-bin is &lt;1.9.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824133" version="1" comment="golang-docs is &lt;1.9.4-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824134" version="1" comment="golang-misc is &lt;1.9.4-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824135" version="1" comment="golang-src is &lt;1.9.4-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824136" version="1" comment="golang-tests is &lt;1.9.4-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824137" version="1" comment="policycoreutils is &lt;2.5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824138" version="1" comment="policycoreutils-devel is &lt;2.5-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824139" version="1" comment="policycoreutils-gui is &lt;2.5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824140" version="1" comment="policycoreutils-newrole is &lt;2.5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824141" version="1" comment="policycoreutils-python is &lt;2.5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824142" version="1" comment="policycoreutils-restorecond is &lt;2.5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824143" version="1" comment="policycoreutils-sandbox is &lt;2.5-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824144" version="1" comment="openssh is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824145" version="1" comment="openssh-askpass is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824146" version="1" comment="openssh-cavs is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824147" version="1" comment="openssh-clients is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824148" version="1" comment="openssh-keycat is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824149" version="1" comment="openssh-ldap is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824150" version="1" comment="openssh-server is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824151" version="1" comment="openssh-server-sysvinit is &lt;7.4p1-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824152" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-2.16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824153" version="1" comment="openssl is &lt;1.0.2k-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824154" version="1" comment="openssl-devel is &lt;1.0.2k-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824155" version="1" comment="openssl-libs is &lt;1.0.2k-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824156" version="1" comment="openssl-perl is &lt;1.0.2k-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824157" version="1" comment="openssl-static is &lt;1.0.2k-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824158" version="1" comment="libvncserver is &lt;0.9.9-12.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824159" version="1" comment="libvncserver-devel is &lt;0.9.9-12.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824160" version="1" comment="libvorbis is &lt;1.3.3-8.el7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824161" version="1" comment="libvorbis-devel is &lt;1.3.3-8.el7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824162" version="1" comment="libvorbis-devel-docs is &lt;1.3.3-8.el7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824163" version="1" comment="pcs is &lt;0.9.162-5.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824164" version="1" comment="pcs-snmp is &lt;0.9.162-5.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824165" version="1" comment="kernel is &lt;3.10.0-862.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824166" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-862.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824167" version="1" comment="kernel-debug is &lt;3.10.0-862.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824170" version="1" comment="kernel-doc is &lt;3.10.0-862.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824171" version="1" comment="kernel-headers is &lt;3.10.0-862.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824172" version="1" comment="kernel-tools is &lt;3.10.0-862.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824173" version="1" comment="kernel-tools-libs is &lt;3.10.0-862.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824175" version="1" comment="perf is &lt;3.10.0-862.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824176" version="1" comment="python-perf is &lt;3.10.0-862.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824177" version="1" comment="firefox is &lt;52.7.3-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824178" version="1" comment="corosync is &lt;2.4.3-2.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824179" version="1" comment="corosync-qdevice is &lt;2.4.3-2.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824180" version="1" comment="corosync-qnetd is &lt;2.4.3-2.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824181" version="1" comment="corosynclib is &lt;2.4.3-2.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824182" version="1" comment="corosynclib-devel is &lt;2.4.3-2.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824183" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824184" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824185" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824186" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824187" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824188" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824189" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824190" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824191" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824192" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824193" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.171-7.b10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824194" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.171-7.b10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824195" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.171-7.b10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824196" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.171-7.b10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824197" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824198" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.171-7.b10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824199" version="1" comment="patch is &lt;2.7.1-10.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824200" version="1" comment="librelp is &lt;1.2.12-1.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824201" version="1" comment="librelp-devel is &lt;1.2.12-1.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824202" version="1" comment="PackageKit is &lt;1.1.5-2.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824203" version="1" comment="PackageKit-command-not-found is &lt;1.1.5-2.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824204" version="1" comment="PackageKit-cron is &lt;1.1.5-2.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824205" version="1" comment="PackageKit-glib is &lt;1.1.5-2.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824206" version="1" comment="PackageKit-glib-devel is &lt;1.1.5-2.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824207" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.5-2.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824208" version="1" comment="PackageKit-gtk3-module is &lt;1.1.5-2.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824209" version="1" comment="PackageKit-yum is &lt;1.1.5-2.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824210" version="1" comment="PackageKit-yum-plugin is &lt;1.1.5-2.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824211" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.181-2.6.14.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824212" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.181-2.6.14.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824213" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.181-2.6.14.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824214" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.181-2.6.14.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824215" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.181-2.6.14.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824216" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.181-2.6.14.5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824217" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.181-2.6.14.5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824218" version="1" comment="kernel is &lt;3.10.0-862.2.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824219" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-862.2.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824220" version="1" comment="kernel-debug is &lt;3.10.0-862.2.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824223" version="1" comment="kernel-doc is &lt;3.10.0-862.2.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824224" version="1" comment="kernel-headers is &lt;3.10.0-862.2.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824225" version="1" comment="kernel-tools is &lt;3.10.0-862.2.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824226" version="1" comment="kernel-tools-libs is &lt;3.10.0-862.2.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824228" version="1" comment="perf is &lt;3.10.0-862.2.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824229" version="1" comment="python-perf is &lt;3.10.0-862.2.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824230" version="1" comment="389-ds-base is &lt;1.3.7.5-21.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824231" version="1" comment="389-ds-base-devel is &lt;1.3.7.5-21.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824232" version="1" comment="389-ds-base-libs is &lt;1.3.7.5-21.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824233" version="1" comment="389-ds-base-snmp is &lt;1.3.7.5-21.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824234" version="1" comment="libvirt is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824235" version="1" comment="libvirt-admin is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824236" version="1" comment="libvirt-client is &lt;3.9.0-14.el7_5.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824237" version="1" comment="libvirt-daemon is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824238" version="1" comment="libvirt-daemon-config-network is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824239" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824240" version="1" comment="libvirt-daemon-driver-interface is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824241" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824242" version="1" comment="libvirt-daemon-driver-network is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824243" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824244" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824245" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824246" version="1" comment="libvirt-daemon-driver-secret is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824247" version="1" comment="libvirt-daemon-driver-storage is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824248" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824249" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824250" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824251" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824252" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824253" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824254" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824255" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824256" version="1" comment="libvirt-daemon-kvm is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824257" version="1" comment="libvirt-daemon-lxc is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824258" version="1" comment="libvirt-devel is &lt;3.9.0-14.el7_5.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824259" version="1" comment="libvirt-docs is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824260" version="1" comment="libvirt-libs is &lt;3.9.0-14.el7_5.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824261" version="1" comment="libvirt-lock-sanlock is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824262" version="1" comment="libvirt-login-shell is &lt;3.9.0-14.el7_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824263" version="1" comment="libvirt-nss is &lt;3.9.0-14.el7_5.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824264" version="1" comment="firefox is &lt;52.8.0-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824265" version="1" comment="qemu-img is &lt;1.5.3-156.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824266" version="1" comment="qemu-kvm is &lt;1.5.3-156.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824267" version="1" comment="qemu-kvm-common is &lt;1.5.3-156.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824268" version="1" comment="qemu-kvm-tools is &lt;1.5.3-156.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824269" version="1" comment="dhclient is &lt;4.2.5-68.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824270" version="1" comment="dhcp is &lt;4.2.5-68.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824271" version="1" comment="dhcp-common is &lt;4.2.5-68.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824272" version="1" comment="dhcp-devel is &lt;4.2.5-68.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824273" version="1" comment="dhcp-libs is &lt;4.2.5-68.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824274" version="1" comment="kernel is &lt;3.10.0-862.3.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824275" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-862.3.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824276" version="1" comment="kernel-debug is &lt;3.10.0-862.3.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824279" version="1" comment="kernel-doc is &lt;3.10.0-862.3.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824280" version="1" comment="kernel-headers is &lt;3.10.0-862.3.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824281" version="1" comment="kernel-tools is &lt;3.10.0-862.3.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824282" version="1" comment="kernel-tools-libs is &lt;3.10.0-862.3.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824284" version="1" comment="perf is &lt;3.10.0-862.3.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824285" version="1" comment="python-perf is &lt;3.10.0-862.3.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824286" version="1" comment="libvirt is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824287" version="1" comment="libvirt-admin is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824288" version="1" comment="libvirt-client is &lt;3.9.0-14.el7_5.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824289" version="1" comment="libvirt-daemon is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824290" version="1" comment="libvirt-daemon-config-network is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824291" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824292" version="1" comment="libvirt-daemon-driver-interface is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824293" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824294" version="1" comment="libvirt-daemon-driver-network is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824295" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824296" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824297" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824298" version="1" comment="libvirt-daemon-driver-secret is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824299" version="1" comment="libvirt-daemon-driver-storage is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824300" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824301" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824302" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824303" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824304" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824305" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824306" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824307" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824308" version="1" comment="libvirt-daemon-kvm is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824309" version="1" comment="libvirt-daemon-lxc is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824310" version="1" comment="libvirt-devel is &lt;3.9.0-14.el7_5.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824311" version="1" comment="libvirt-docs is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824312" version="1" comment="libvirt-libs is &lt;3.9.0-14.el7_5.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824313" version="1" comment="libvirt-lock-sanlock is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824314" version="1" comment="libvirt-login-shell is &lt;3.9.0-14.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824315" version="1" comment="libvirt-nss is &lt;3.9.0-14.el7_5.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824316" version="1" comment="qemu-img is &lt;1.5.3-156.el7_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824317" version="1" comment="qemu-kvm is &lt;1.5.3-156.el7_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824318" version="1" comment="qemu-kvm-common is &lt;1.5.3-156.el7_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824319" version="1" comment="qemu-kvm-tools is &lt;1.5.3-156.el7_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824320" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.181-2.6.14.8.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824321" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.181-2.6.14.8.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824322" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.181-2.6.14.8.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824323" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.181-2.6.14.8.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824324" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.181-2.6.14.8.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824325" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.181-2.6.14.8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824326" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.181-2.6.14.8.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824327" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824328" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824329" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824330" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824331" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824332" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824333" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824334" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824335" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824336" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824337" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.171-8.b10.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824338" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.171-8.b10.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824339" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.171-8.b10.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824340" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.171-8.b10.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824341" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824342" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.171-8.b10.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824343" version="1" comment="procps-ng is &lt;3.3.10-17.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824344" version="1" comment="procps-ng-devel is &lt;3.3.10-17.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824345" version="1" comment="procps-ng-i18n is &lt;3.3.10-17.el7_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824346" version="1" comment="thunderbird is &lt;52.8.0-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824347" version="1" comment="xmlrpc-client is &lt;3.1.3-9.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824348" version="1" comment="xmlrpc-common is &lt;3.1.3-9.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824349" version="1" comment="xmlrpc-javadoc is &lt;3.1.3-9.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824350" version="1" comment="xmlrpc-server is &lt;3.1.3-9.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824351" version="1" comment="plexus-archiver is &lt;2.4.2-5.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824352" version="1" comment="plexus-archiver-javadoc is &lt;2.4.2-5.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824353" version="1" comment="kernel is &lt;3.10.0-862.3.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824354" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-862.3.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824355" version="1" comment="kernel-debug is &lt;3.10.0-862.3.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824358" version="1" comment="kernel-doc is &lt;3.10.0-862.3.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824359" version="1" comment="kernel-headers is &lt;3.10.0-862.3.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824360" version="1" comment="kernel-tools is &lt;3.10.0-862.3.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824361" version="1" comment="kernel-tools-libs is &lt;3.10.0-862.3.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824363" version="1" comment="perf is &lt;3.10.0-862.3.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824364" version="1" comment="python-perf is &lt;3.10.0-862.3.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824365" version="1" comment="emacs-git is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824366" version="1" comment="emacs-git-el is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824367" version="1" comment="git is &lt;1.8.3.1-14.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824368" version="1" comment="git-all is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824369" version="1" comment="git-bzr is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824370" version="1" comment="git-cvs is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824371" version="1" comment="git-daemon is &lt;1.8.3.1-14.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824372" version="1" comment="git-email is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824373" version="1" comment="git-gui is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824374" version="1" comment="git-hg is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824375" version="1" comment="git-p4 is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824376" version="1" comment="git-svn is &lt;1.8.3.1-14.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824377" version="1" comment="gitk is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824378" version="1" comment="gitweb is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824379" version="1" comment="perl-Git is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824380" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-14.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824381" version="1" comment="kernel is &lt;3.10.0-862.6.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824382" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-862.6.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824383" version="1" comment="kernel-debug is &lt;3.10.0-862.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824386" version="1" comment="kernel-doc is &lt;3.10.0-862.6.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824387" version="1" comment="kernel-headers is &lt;3.10.0-862.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824388" version="1" comment="kernel-tools is &lt;3.10.0-862.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824389" version="1" comment="kernel-tools-libs is &lt;3.10.0-862.6.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824391" version="1" comment="perf is &lt;3.10.0-862.6.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824392" version="1" comment="python-perf is &lt;3.10.0-862.6.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824393" version="1" comment="pki-base is &lt;10.5.1-13.1.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824394" version="1" comment="pki-base-java is &lt;10.5.1-13.1.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824395" version="1" comment="pki-ca is &lt;10.5.1-13.1.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824396" version="1" comment="pki-javadoc is &lt;10.5.1-13.1.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824397" version="1" comment="pki-kra is &lt;10.5.1-13.1.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824398" version="1" comment="pki-server is &lt;10.5.1-13.1.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824399" version="1" comment="pki-symkey is &lt;10.5.1-13.1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824400" version="1" comment="pki-tools is &lt;10.5.1-13.1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824401" version="1" comment="libvirt is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824402" version="1" comment="libvirt-admin is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824403" version="1" comment="libvirt-client is &lt;3.9.0-14.el7_5.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824404" version="1" comment="libvirt-daemon is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824405" version="1" comment="libvirt-daemon-config-network is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824406" version="1" comment="libvirt-daemon-config-nwfilter is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824407" version="1" comment="libvirt-daemon-driver-interface is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824408" version="1" comment="libvirt-daemon-driver-lxc is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824409" version="1" comment="libvirt-daemon-driver-network is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824410" version="1" comment="libvirt-daemon-driver-nodedev is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824411" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824412" version="1" comment="libvirt-daemon-driver-qemu is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824413" version="1" comment="libvirt-daemon-driver-secret is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824414" version="1" comment="libvirt-daemon-driver-storage is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824415" version="1" comment="libvirt-daemon-driver-storage-core is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824416" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824417" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824418" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824419" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824420" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824421" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824422" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824423" version="1" comment="libvirt-daemon-kvm is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824424" version="1" comment="libvirt-daemon-lxc is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824425" version="1" comment="libvirt-devel is &lt;3.9.0-14.el7_5.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824426" version="1" comment="libvirt-docs is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824427" version="1" comment="libvirt-libs is &lt;3.9.0-14.el7_5.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824428" version="1" comment="libvirt-lock-sanlock is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824429" version="1" comment="libvirt-login-shell is &lt;3.9.0-14.el7_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824430" version="1" comment="libvirt-nss is &lt;3.9.0-14.el7_5.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824431" version="1" comment="qemu-img is &lt;1.5.3-156.el7_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824432" version="1" comment="qemu-kvm is &lt;1.5.3-156.el7_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824433" version="1" comment="qemu-kvm-common is &lt;1.5.3-156.el7_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824434" version="1" comment="qemu-kvm-tools is &lt;1.5.3-156.el7_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824435" version="1" comment="dpdk is &lt;17.11-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824436" version="1" comment="dpdk-devel is &lt;17.11-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824437" version="1" comment="dpdk-doc is &lt;17.11-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824438" version="1" comment="dpdk-tools is &lt;17.11-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824439" version="1" comment="firefox is &lt;60.1.0-4.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824440" version="1" comment="python is &lt;2.7.5-69.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824441" version="1" comment="python-debug is &lt;2.7.5-69.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824442" version="1" comment="python-devel is &lt;2.7.5-69.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824443" version="1" comment="python-libs is &lt;2.7.5-69.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824444" version="1" comment="python-test is &lt;2.7.5-69.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824445" version="1" comment="python-tools is &lt;2.7.5-69.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824446" version="1" comment="tkinter is &lt;2.7.5-69.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824447" version="1" comment="gnupg2 is &lt;2.0.22-5.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824448" version="1" comment="gnupg2-smime is &lt;2.0.22-5.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824449" version="1" comment="openslp is &lt;2.0.0-7.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824450" version="1" comment="openslp-devel is &lt;2.0.0-7.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824451" version="1" comment="openslp-server is &lt;2.0.0-7.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824452" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824453" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824454" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824455" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824456" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824457" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824458" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824459" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824460" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824461" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824462" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.181-3.b13.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824463" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.181-3.b13.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824464" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.181-3.b13.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824465" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.181-3.b13.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824466" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824467" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.181-3.b13.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824468" version="1" comment="thunderbird is &lt;52.9.1-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824469" version="1" comment="yum-NetworkManager-dispatcher is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824470" version="1" comment="yum-plugin-aliases is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824471" version="1" comment="yum-plugin-auto-update-debug-info is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824472" version="1" comment="yum-plugin-changelog is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824473" version="1" comment="yum-plugin-copr is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824474" version="1" comment="yum-plugin-fastestmirror is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824475" version="1" comment="yum-plugin-filter-data is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824476" version="1" comment="yum-plugin-fs-snapshot is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824477" version="1" comment="yum-plugin-keys is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824478" version="1" comment="yum-plugin-list-data is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824479" version="1" comment="yum-plugin-local is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824480" version="1" comment="yum-plugin-merge-conf is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824481" version="1" comment="yum-plugin-ovl is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824482" version="1" comment="yum-plugin-post-transaction-actions is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824483" version="1" comment="yum-plugin-pre-transaction-actions is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824484" version="1" comment="yum-plugin-priorities is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824485" version="1" comment="yum-plugin-protectbase is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824486" version="1" comment="yum-plugin-ps is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824487" version="1" comment="yum-plugin-remove-with-leaves is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824488" version="1" comment="yum-plugin-rpm-warm-cache is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824489" version="1" comment="yum-plugin-show-leaves is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824490" version="1" comment="yum-plugin-tmprepo is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824491" version="1" comment="yum-plugin-tsflags is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824492" version="1" comment="yum-plugin-upgrade-helper is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824493" version="1" comment="yum-plugin-verify is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824494" version="1" comment="yum-plugin-versionlock is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824495" version="1" comment="yum-updateonboot is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824496" version="1" comment="yum-utils is &lt;1.1.31-46.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824497" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.191-2.6.15.4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824498" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.191-2.6.15.4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824499" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.191-2.6.15.4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824500" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.191-2.6.15.4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824501" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.191-2.6.15.4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824502" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.191-2.6.15.4.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824503" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.191-2.6.15.4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824504" version="1" comment="kernel is &lt;3.10.0-862.11.6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824505" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-862.11.6.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824506" version="1" comment="kernel-debug is &lt;3.10.0-862.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824509" version="1" comment="kernel-doc is &lt;3.10.0-862.11.6.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824510" version="1" comment="kernel-headers is &lt;3.10.0-862.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824511" version="1" comment="kernel-tools is &lt;3.10.0-862.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824512" version="1" comment="kernel-tools-libs is &lt;3.10.0-862.11.6.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824514" version="1" comment="perf is &lt;3.10.0-862.11.6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824515" version="1" comment="python-perf is &lt;3.10.0-862.11.6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824516" version="1" comment="mariadb is &lt;5.5.60-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824517" version="1" comment="mariadb-bench is &lt;5.5.60-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824518" version="1" comment="mariadb-devel is &lt;5.5.60-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824519" version="1" comment="mariadb-embedded is &lt;5.5.60-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824520" version="1" comment="mariadb-embedded-devel is &lt;5.5.60-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824521" version="1" comment="mariadb-libs is &lt;5.5.60-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824522" version="1" comment="mariadb-server is &lt;5.5.60-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824523" version="1" comment="mariadb-test is &lt;5.5.60-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824524" version="1" comment="qemu-img is &lt;1.5.3-156.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824525" version="1" comment="qemu-kvm is &lt;1.5.3-156.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824526" version="1" comment="qemu-kvm-common is &lt;1.5.3-156.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824527" version="1" comment="qemu-kvm-tools is &lt;1.5.3-156.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824528" version="1" comment="mutt is &lt;1.5.21-28.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824529" version="1" comment="postgresql is &lt;9.2.24-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824530" version="1" comment="postgresql-contrib is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824531" version="1" comment="postgresql-devel is &lt;9.2.24-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824532" version="1" comment="postgresql-docs is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824533" version="1" comment="postgresql-libs is &lt;9.2.24-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824534" version="1" comment="postgresql-plperl is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824535" version="1" comment="postgresql-plpython is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824536" version="1" comment="postgresql-pltcl is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824537" version="1" comment="postgresql-server is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824538" version="1" comment="postgresql-static is &lt;9.2.24-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824539" version="1" comment="postgresql-test is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824540" version="1" comment="postgresql-upgrade is &lt;9.2.24-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824541" version="1" comment="bind is &lt;9.9.4-61.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824542" version="1" comment="bind-chroot is &lt;9.9.4-61.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824543" version="1" comment="bind-devel is &lt;9.9.4-61.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824544" version="1" comment="bind-libs is &lt;9.9.4-61.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824545" version="1" comment="bind-libs-lite is &lt;9.9.4-61.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824546" version="1" comment="bind-license is &lt;9.9.4-61.el7_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824547" version="1" comment="bind-lite-devel is &lt;9.9.4-61.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824548" version="1" comment="bind-pkcs11 is &lt;9.9.4-61.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824549" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-61.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824550" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-61.el7_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824551" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-61.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824552" version="1" comment="bind-sdb is &lt;9.9.4-61.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824553" version="1" comment="bind-sdb-chroot is &lt;9.9.4-61.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824554" version="1" comment="bind-utils is &lt;9.9.4-61.el7_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824555" version="1" comment="firefox is &lt;60.2.0-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824556" version="1" comment="spice-glib is &lt;0.34-3.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824557" version="1" comment="spice-glib-devel is &lt;0.34-3.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824558" version="1" comment="spice-gtk-tools is &lt;0.34-3.el7_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824559" version="1" comment="spice-gtk3 is &lt;0.34-3.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824560" version="1" comment="spice-gtk3-devel is &lt;0.34-3.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824561" version="1" comment="spice-gtk3-vala is &lt;0.34-3.el7_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824562" version="1" comment="spice-server is &lt;0.14.0-2.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824563" version="1" comment="spice-server-devel is &lt;0.14.0-2.el7_5.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824564" version="1" comment="kernel is &lt;3.10.0-862.14.4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824565" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-862.14.4.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824566" version="1" comment="kernel-debug is &lt;3.10.0-862.14.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824569" version="1" comment="kernel-doc is &lt;3.10.0-862.14.4.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824570" version="1" comment="kernel-headers is &lt;3.10.0-862.14.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824571" version="1" comment="kernel-tools is &lt;3.10.0-862.14.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824572" version="1" comment="kernel-tools-libs is &lt;3.10.0-862.14.4.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824574" version="1" comment="perf is &lt;3.10.0-862.14.4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824575" version="1" comment="python-perf is &lt;3.10.0-862.14.4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824576" version="1" comment="389-ds-base is &lt;1.3.7.5-28.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824577" version="1" comment="389-ds-base-devel is &lt;1.3.7.5-28.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824578" version="1" comment="389-ds-base-libs is &lt;1.3.7.5-28.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824579" version="1" comment="389-ds-base-snmp is &lt;1.3.7.5-28.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824580" version="1" comment="flatpak is &lt;0.8.8-4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824581" version="1" comment="flatpak-builder is &lt;0.8.8-4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824582" version="1" comment="flatpak-devel is &lt;0.8.8-4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824583" version="1" comment="flatpak-libs is &lt;0.8.8-4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824584" version="1" comment="nss is &lt;3.36.0-7.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824585" version="1" comment="nss-devel is &lt;3.36.0-7.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824586" version="1" comment="nss-pkcs11-devel is &lt;3.36.0-7.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824587" version="1" comment="nss-sysinit is &lt;3.36.0-7.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824588" version="1" comment="nss-tools is &lt;3.36.0-7.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824589" version="1" comment="firefox is &lt;60.2.1-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824590" version="1" comment="firefox is &lt;60.2.2-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824591" version="1" comment="spamassassin is &lt;3.4.0-4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824592" version="1" comment="ghostscript is &lt;9.07-29.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824593" version="1" comment="ghostscript-cups is &lt;9.07-29.el7_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824594" version="1" comment="ghostscript-devel is &lt;9.07-29.el7_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824595" version="1" comment="ghostscript-doc is &lt;9.07-29.el7_5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824596" version="1" comment="ghostscript-gtk is &lt;9.07-29.el7_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824597" version="1" comment="tomcat is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824598" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824599" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824600" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824601" version="1" comment="tomcat-javadoc is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824602" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824603" version="1" comment="tomcat-jsvc is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824604" version="1" comment="tomcat-lib is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824605" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824606" version="1" comment="tomcat-webapps is &lt;7.0.76-8.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824607" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824608" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824609" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824610" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824611" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824612" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824613" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824614" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824615" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824616" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824617" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.191.b12-0.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824618" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.191.b12-0.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824619" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.191.b12-0.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824620" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.191.b12-0.el7_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824621" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824622" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.191.b12-0.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824623" version="1" comment="firefox is &lt;60.3.0-1.el7_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824624" version="1" comment="binutils is &lt;2.27-34.base.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824625" version="1" comment="binutils-devel is &lt;2.27-34.base.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824626" version="1" comment="python is &lt;2.7.5-76.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824627" version="1" comment="python-debug is &lt;2.7.5-76.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824628" version="1" comment="python-devel is &lt;2.7.5-76.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824629" version="1" comment="python-libs is &lt;2.7.5-76.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824630" version="1" comment="python-test is &lt;2.7.5-76.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824631" version="1" comment="python-tools is &lt;2.7.5-76.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824632" version="1" comment="tkinter is &lt;2.7.5-76.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824633" version="1" comment="gnutls is &lt;3.3.29-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824634" version="1" comment="gnutls-c++ is &lt;3.3.29-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824635" version="1" comment="gnutls-dane is &lt;3.3.29-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824636" version="1" comment="gnutls-devel is &lt;3.3.29-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824637" version="1" comment="gnutls-utils is &lt;3.3.29-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824638" version="1" comment="wget is &lt;1.14-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824639" version="1" comment="ctdb is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824640" version="1" comment="ctdb-tests is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824641" version="1" comment="libsmbclient is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824642" version="1" comment="libsmbclient-devel is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824643" version="1" comment="libwbclient is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824644" version="1" comment="libwbclient-devel is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824645" version="1" comment="samba is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824646" version="1" comment="samba-client is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824647" version="1" comment="samba-client-libs is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824648" version="1" comment="samba-common is &lt;4.8.3-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824649" version="1" comment="samba-common-libs is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824650" version="1" comment="samba-common-tools is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824651" version="1" comment="samba-dc is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824652" version="1" comment="samba-dc-libs is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824653" version="1" comment="samba-devel is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824654" version="1" comment="samba-krb5-printing is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824655" version="1" comment="samba-libs is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824656" version="1" comment="samba-pidl is &lt;4.8.3-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824657" version="1" comment="samba-python is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824658" version="1" comment="samba-python-test is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824659" version="1" comment="samba-test is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824660" version="1" comment="samba-test-libs is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824661" version="1" comment="samba-vfs-glusterfs is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824662" version="1" comment="samba-winbind is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824663" version="1" comment="samba-winbind-clients is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824664" version="1" comment="samba-winbind-krb5-locator is &lt;4.8.3-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824665" version="1" comment="samba-winbind-modules is &lt;4.8.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824666" version="1" comment="drm-utils is &lt;2.4.91-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824667" version="1" comment="egl-utils is &lt;8.3.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824668" version="1" comment="freeglut is &lt;3.0.0-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824669" version="1" comment="freeglut-devel is &lt;3.0.0-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824670" version="1" comment="glx-utils is &lt;8.3.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824671" version="1" comment="intel-gpu-tools is &lt;2.99.917-28.20180530.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824672" version="1" comment="libX11 is &lt;1.6.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824673" version="1" comment="libX11-common is &lt;1.6.5-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824674" version="1" comment="libX11-devel is &lt;1.6.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824675" version="1" comment="libXcursor is &lt;1.1.15-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824676" version="1" comment="libXcursor-devel is &lt;1.1.15-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824677" version="1" comment="libXfont is &lt;1.5.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824678" version="1" comment="libXfont-devel is &lt;1.5.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824679" version="1" comment="libXfont2 is &lt;2.0.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824680" version="1" comment="libXfont2-devel is &lt;2.0.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824681" version="1" comment="libXres is &lt;1.2.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824682" version="1" comment="libXres-devel is &lt;1.2.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824683" version="1" comment="libdrm is &lt;2.4.91-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824684" version="1" comment="libdrm-devel is &lt;2.4.91-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824685" version="1" comment="libepoxy is &lt;1.5.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824686" version="1" comment="libepoxy-devel is &lt;1.5.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824687" version="1" comment="libglvnd is &lt;1.0.1-0.8.git5baa1e5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824688" version="1" comment="libglvnd-core-devel is &lt;1.0.1-0.8.git5baa1e5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824689" version="1" comment="libglvnd-devel is &lt;1.0.1-0.8.git5baa1e5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824690" version="1" comment="libglvnd-egl is &lt;1.0.1-0.8.git5baa1e5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824691" version="1" comment="libglvnd-gles is &lt;1.0.1-0.8.git5baa1e5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824692" version="1" comment="libglvnd-glx is &lt;1.0.1-0.8.git5baa1e5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824693" version="1" comment="libglvnd-opengl is &lt;1.0.1-0.8.git5baa1e5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824694" version="1" comment="libinput is &lt;1.10.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824695" version="1" comment="libinput-devel is &lt;1.10.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824696" version="1" comment="libwacom is &lt;0.30-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824697" version="1" comment="libwacom-data is &lt;0.30-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824698" version="1" comment="libwacom-devel is &lt;0.30-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824699" version="1" comment="libxcb is &lt;1.13-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824700" version="1" comment="libxcb-devel is &lt;1.13-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824701" version="1" comment="libxcb-doc is &lt;1.13-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824702" version="1" comment="mesa-demos is &lt;8.3.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824703" version="1" comment="mesa-dri-drivers is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824704" version="1" comment="mesa-filesystem is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824705" version="1" comment="mesa-libEGL is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824706" version="1" comment="mesa-libEGL-devel is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824707" version="1" comment="mesa-libGL is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824708" version="1" comment="mesa-libGL-devel is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824709" version="1" comment="mesa-libGLES is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824710" version="1" comment="mesa-libGLES-devel is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824711" version="1" comment="mesa-libOSMesa is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824712" version="1" comment="mesa-libOSMesa-devel is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824713" version="1" comment="mesa-libgbm is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824714" version="1" comment="mesa-libgbm-devel is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824715" version="1" comment="mesa-libglapi is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824716" version="1" comment="mesa-libwayland-egl is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824717" version="1" comment="mesa-libwayland-egl-devel is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824718" version="1" comment="mesa-libxatracker is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824719" version="1" comment="mesa-libxatracker-devel is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824720" version="1" comment="mesa-vdpau-drivers is &lt;18.0.5-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824721" version="1" comment="mesa-vulkan-drivers is &lt;18.0.5-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824722" version="1" comment="tigervnc is &lt;1.8.0-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824723" version="1" comment="tigervnc-icons is &lt;1.8.0-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824724" version="1" comment="tigervnc-license is &lt;1.8.0-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824725" version="1" comment="tigervnc-server is &lt;1.8.0-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824726" version="1" comment="tigervnc-server-applet is &lt;1.8.0-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824727" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824728" version="1" comment="tigervnc-server-module is &lt;1.8.0-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824729" version="1" comment="vulkan is &lt;1.1.73.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824730" version="1" comment="vulkan-devel is &lt;1.1.73.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824731" version="1" comment="vulkan-filesystem is &lt;1.1.73.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824732" version="1" comment="xcb-proto is &lt;1.13-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824733" version="1" comment="xkeyboard-config is &lt;2.24-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824734" version="1" comment="xkeyboard-config-devel is &lt;2.24-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824735" version="1" comment="xorg-x11-drv-ati is &lt;18.0.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824736" version="1" comment="xorg-x11-drv-dummy is &lt;0.3.7-1.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824737" version="1" comment="xorg-x11-drv-evdev is &lt;2.10.6-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824738" version="1" comment="xorg-x11-drv-evdev-devel is &lt;2.10.6-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824739" version="1" comment="xorg-x11-drv-fbdev is &lt;0.5.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824740" version="1" comment="xorg-x11-drv-intel is &lt;2.99.917-28.20180530.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824741" version="1" comment="xorg-x11-drv-intel-devel is &lt;2.99.917-28.20180530.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824742" version="1" comment="xorg-x11-drv-libinput is &lt;0.27.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824743" version="1" comment="xorg-x11-drv-libinput-devel is &lt;0.27.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824744" version="1" comment="xorg-x11-drv-mouse is &lt;1.9.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824745" version="1" comment="xorg-x11-drv-mouse-devel is &lt;1.9.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824746" version="1" comment="xorg-x11-drv-nouveau is &lt;1.0.15-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824747" version="1" comment="xorg-x11-drv-openchrome is &lt;0.5.0-3.el7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824748" version="1" comment="xorg-x11-drv-openchrome-devel is &lt;0.5.0-3.el7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824749" version="1" comment="xorg-x11-drv-qxl is &lt;0.1.5-4.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824750" version="1" comment="xorg-x11-drv-synaptics is &lt;1.9.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824751" version="1" comment="xorg-x11-drv-synaptics-devel is &lt;1.9.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824752" version="1" comment="xorg-x11-drv-v4l is &lt;0.2.0-49.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824753" version="1" comment="xorg-x11-drv-vesa is &lt;2.4.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824754" version="1" comment="xorg-x11-drv-vmmouse is &lt;13.1.0-1.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824755" version="1" comment="xorg-x11-drv-vmware is &lt;13.2.1-1.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824756" version="1" comment="xorg-x11-drv-void is &lt;1.4.1-2.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824757" version="1" comment="xorg-x11-drv-wacom is &lt;0.36.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824758" version="1" comment="xorg-x11-drv-wacom-devel is &lt;0.36.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824759" version="1" comment="xorg-x11-font-utils is &lt;7.5-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824760" version="1" comment="xorg-x11-proto-devel is &lt;2018.4-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824761" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824762" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824763" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824764" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824765" version="1" comment="xorg-x11-server-Xspice is &lt;0.1.5-4.el7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824766" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824767" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824768" version="1" comment="xorg-x11-server-common is &lt;1.20.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824769" version="1" comment="xorg-x11-server-devel is &lt;1.20.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824770" version="1" comment="xorg-x11-server-source is &lt;1.20.1-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824771" version="1" comment="xorg-x11-utils is &lt;7.5-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824772" version="1" comment="xorg-x11-xkb-extras is &lt;7.7-14.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824773" version="1" comment="xorg-x11-xkb-utils is &lt;7.7-14.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824774" version="1" comment="xorg-x11-xkb-utils-devel is &lt;7.7-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824775" version="1" comment="libkdcraw is &lt;4.10.5-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824776" version="1" comment="libkdcraw-devel is &lt;4.10.5-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824777" version="1" comment="krb5-devel is &lt;1.15.1-34.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824778" version="1" comment="krb5-libs is &lt;1.15.1-34.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824779" version="1" comment="krb5-pkinit is &lt;1.15.1-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824780" version="1" comment="krb5-server is &lt;1.15.1-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824781" version="1" comment="krb5-server-ldap is &lt;1.15.1-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824782" version="1" comment="krb5-workstation is &lt;1.15.1-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824783" version="1" comment="libkadm5 is &lt;1.15.1-34.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824784" version="1" comment="zsh is &lt;5.0.2-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824785" version="1" comment="zsh-html is &lt;5.0.2-31.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824786" version="1" comment="bpftool is &lt;3.10.0-957.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824787" version="1" comment="kernel is &lt;3.10.0-957.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824788" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824789" version="1" comment="kernel-debug is &lt;3.10.0-957.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824792" version="1" comment="kernel-doc is &lt;3.10.0-957.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824793" version="1" comment="kernel-headers is &lt;3.10.0-957.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824794" version="1" comment="kernel-tools is &lt;3.10.0-957.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824795" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824797" version="1" comment="perf is &lt;3.10.0-957.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824798" version="1" comment="python-perf is &lt;3.10.0-957.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824799" version="1" comment="OVMF is &lt;20180508-3.gitee3198e672e2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824800" version="1" comment="glibc is &lt;2.17-260.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824801" version="1" comment="glibc-common is &lt;2.17-260.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824802" version="1" comment="glibc-devel is &lt;2.17-260.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824803" version="1" comment="glibc-headers is &lt;2.17-260.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824804" version="1" comment="glibc-static is &lt;2.17-260.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824805" version="1" comment="glibc-utils is &lt;2.17-260.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824806" version="1" comment="nscd is &lt;2.17-260.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824807" version="1" comment="wpa_supplicant is &lt;2.6-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824808" version="1" comment="libvirt is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824809" version="1" comment="libvirt-admin is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824810" version="1" comment="libvirt-bash-completion is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824811" version="1" comment="libvirt-client is &lt;4.5.0-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824812" version="1" comment="libvirt-daemon is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824813" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824814" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824815" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824816" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824817" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824818" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824819" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824820" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824821" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824822" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824823" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824824" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824825" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824826" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824827" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824828" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824829" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824830" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824831" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824832" version="1" comment="libvirt-daemon-lxc is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824833" version="1" comment="libvirt-devel is &lt;4.5.0-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824834" version="1" comment="libvirt-docs is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824835" version="1" comment="libvirt-libs is &lt;4.5.0-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824836" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824837" version="1" comment="libvirt-login-shell is &lt;4.5.0-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824838" version="1" comment="libvirt-nss is &lt;4.5.0-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824839" version="1" comment="389-ds-base is &lt;1.3.8.4-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824840" version="1" comment="389-ds-base-devel is &lt;1.3.8.4-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824841" version="1" comment="389-ds-base-libs is &lt;1.3.8.4-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824842" version="1" comment="389-ds-base-snmp is &lt;1.3.8.4-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824843" version="1" comment="PackageKit is &lt;1.1.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824844" version="1" comment="PackageKit-command-not-found is &lt;1.1.10-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824845" version="1" comment="PackageKit-cron is &lt;1.1.10-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824846" version="1" comment="PackageKit-glib is &lt;1.1.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824847" version="1" comment="PackageKit-glib-devel is &lt;1.1.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824848" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.10-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824849" version="1" comment="PackageKit-gtk3-module is &lt;1.1.10-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824850" version="1" comment="PackageKit-yum is &lt;1.1.10-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824851" version="1" comment="PackageKit-yum-plugin is &lt;1.1.10-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824852" version="1" comment="accountsservice is &lt;0.6.50-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824853" version="1" comment="accountsservice-devel is &lt;0.6.50-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824854" version="1" comment="accountsservice-libs is &lt;0.6.50-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824855" version="1" comment="adwaita-cursor-theme is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824856" version="1" comment="adwaita-gtk2-theme is &lt;3.28-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824857" version="1" comment="adwaita-icon-theme is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824858" version="1" comment="adwaita-icon-theme-devel is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824859" version="1" comment="appstream-data is &lt;7-20180614.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824860" version="1" comment="at-spi2-atk is &lt;2.26.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824861" version="1" comment="at-spi2-atk-devel is &lt;2.26.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824862" version="1" comment="at-spi2-core is &lt;2.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824863" version="1" comment="at-spi2-core-devel is &lt;2.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824864" version="1" comment="atk is &lt;2.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824865" version="1" comment="atk-devel is &lt;2.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824866" version="1" comment="baobab is &lt;3.28.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824867" version="1" comment="bolt is &lt;0.4-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824868" version="1" comment="brasero is &lt;3.12.2-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824869" version="1" comment="brasero-devel is &lt;3.12.2-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824870" version="1" comment="brasero-libs is &lt;3.12.2-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824871" version="1" comment="brasero-nautilus is &lt;3.12.2-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824872" version="1" comment="cairo is &lt;1.15.12-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824873" version="1" comment="cairo-devel is &lt;1.15.12-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824874" version="1" comment="cairo-gobject is &lt;1.15.12-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824875" version="1" comment="cairo-gobject-devel is &lt;1.15.12-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824876" version="1" comment="cairo-tools is &lt;1.15.12-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824877" version="1" comment="cheese is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824878" version="1" comment="cheese-libs is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824879" version="1" comment="cheese-libs-devel is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824880" version="1" comment="clutter-gst3 is &lt;3.0.26-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824881" version="1" comment="clutter-gst3-devel is &lt;3.0.26-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824882" version="1" comment="compat-exiv2-023 is &lt;0.23-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824883" version="1" comment="compat-libical1 is &lt;1.0.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824884" version="1" comment="control-center is &lt;3.28.1-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824885" version="1" comment="control-center-filesystem is &lt;3.28.1-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824886" version="1" comment="dconf is &lt;0.28.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824887" version="1" comment="dconf-devel is &lt;0.28.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824888" version="1" comment="dconf-editor is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824889" version="1" comment="devhelp is &lt;3.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824890" version="1" comment="devhelp-devel is &lt;3.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824891" version="1" comment="devhelp-libs is &lt;3.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824892" version="1" comment="ekiga is &lt;4.0.1-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824893" version="1" comment="empathy is &lt;3.12.13-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824894" version="1" comment="eog is &lt;3.28.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824895" version="1" comment="eog-devel is &lt;3.28.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824896" version="1" comment="evince is &lt;3.28.2-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824897" version="1" comment="evince-browser-plugin is &lt;3.28.2-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824898" version="1" comment="evince-devel is &lt;3.28.2-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824899" version="1" comment="evince-dvi is &lt;3.28.2-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824900" version="1" comment="evince-libs is &lt;3.28.2-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824901" version="1" comment="evince-nautilus is &lt;3.28.2-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824902" version="1" comment="evolution is &lt;3.28.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824903" version="1" comment="evolution-bogofilter is &lt;3.28.5-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824904" version="1" comment="evolution-data-server is &lt;3.28.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824905" version="1" comment="evolution-data-server-devel is &lt;3.28.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824906" version="1" comment="evolution-data-server-doc is &lt;3.28.5-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824907" version="1" comment="evolution-data-server-langpacks is &lt;3.28.5-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824908" version="1" comment="evolution-data-server-perl is &lt;3.28.5-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824909" version="1" comment="evolution-data-server-tests is &lt;3.28.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824910" version="1" comment="evolution-devel is &lt;3.28.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824911" version="1" comment="evolution-devel-docs is &lt;3.28.5-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824912" version="1" comment="evolution-ews is &lt;3.28.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824913" version="1" comment="evolution-ews-langpacks is &lt;3.28.5-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824914" version="1" comment="evolution-help is &lt;3.28.5-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824915" version="1" comment="evolution-langpacks is &lt;3.28.5-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824916" version="1" comment="evolution-mapi is &lt;3.28.3-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824917" version="1" comment="evolution-mapi-langpacks is &lt;3.28.3-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824918" version="1" comment="evolution-pst is &lt;3.28.5-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824919" version="1" comment="evolution-spamassassin is &lt;3.28.5-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824920" version="1" comment="evolution-tests is &lt;3.28.5-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824921" version="1" comment="file-roller is &lt;3.28.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824922" version="1" comment="file-roller-nautilus is &lt;3.28.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824923" version="1" comment="flatpak is &lt;1.0.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824924" version="1" comment="flatpak-builder is &lt;1.0.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824925" version="1" comment="flatpak-devel is &lt;1.0.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824926" version="1" comment="flatpak-libs is &lt;1.0.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824927" version="1" comment="folks is &lt;0.11.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824928" version="1" comment="folks-devel is &lt;0.11.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824929" version="1" comment="folks-tools is &lt;0.11.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824930" version="1" comment="fontconfig is &lt;2.13.0-4.3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824931" version="1" comment="fontconfig-devel is &lt;2.13.0-4.3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824932" version="1" comment="fontconfig-devel-doc is &lt;2.13.0-4.3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824933" version="1" comment="freetype is &lt;2.8-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824934" version="1" comment="freetype-demos is &lt;2.8-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824935" version="1" comment="freetype-devel is &lt;2.8-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824936" version="1" comment="fribidi is &lt;1.0.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824937" version="1" comment="fribidi-devel is &lt;1.0.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824938" version="1" comment="fwupd is &lt;1.0.8-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824939" version="1" comment="fwupd-devel is &lt;1.0.8-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824940" version="1" comment="fwupdate is &lt;12-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824941" version="1" comment="fwupdate-devel is &lt;12-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824942" version="1" comment="fwupdate-efi is &lt;12-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824943" version="1" comment="fwupdate-libs is &lt;12-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824944" version="1" comment="gcr is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824945" version="1" comment="gcr-devel is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824946" version="1" comment="gdk-pixbuf2 is &lt;2.36.12-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824947" version="1" comment="gdk-pixbuf2-devel is &lt;2.36.12-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824948" version="1" comment="gdk-pixbuf2-tests is &lt;2.36.12-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824949" version="1" comment="gdm is &lt;3.28.2-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824950" version="1" comment="gdm-devel is &lt;3.28.2-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824951" version="1" comment="gdm-pam-extensions-devel is &lt;3.28.2-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824952" version="1" comment="gedit is &lt;3.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824953" version="1" comment="gedit-devel is &lt;3.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824954" version="1" comment="gedit-plugin-bookmarks is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824955" version="1" comment="gedit-plugin-bracketcompletion is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824956" version="1" comment="gedit-plugin-charmap is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824957" version="1" comment="gedit-plugin-codecomment is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824958" version="1" comment="gedit-plugin-colorpicker is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824959" version="1" comment="gedit-plugin-colorschemer is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824960" version="1" comment="gedit-plugin-commander is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824961" version="1" comment="gedit-plugin-drawspaces is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824962" version="1" comment="gedit-plugin-findinfiles is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824963" version="1" comment="gedit-plugin-joinlines is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824964" version="1" comment="gedit-plugin-multiedit is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824965" version="1" comment="gedit-plugin-smartspaces is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824966" version="1" comment="gedit-plugin-synctex is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824967" version="1" comment="gedit-plugin-terminal is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824968" version="1" comment="gedit-plugin-textsize is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824969" version="1" comment="gedit-plugin-translate is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824970" version="1" comment="gedit-plugin-wordcompletion is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824971" version="1" comment="gedit-plugins is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824972" version="1" comment="gedit-plugins-data is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824973" version="1" comment="geoclue2 is &lt;2.4.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824974" version="1" comment="geoclue2-demos is &lt;2.4.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824975" version="1" comment="geoclue2-devel is &lt;2.4.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824976" version="1" comment="geoclue2-libs is &lt;2.4.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824977" version="1" comment="geocode-glib is &lt;3.26.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824978" version="1" comment="geocode-glib-devel is &lt;3.26.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824979" version="1" comment="gjs is &lt;1.52.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824980" version="1" comment="gjs-devel is &lt;1.52.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824981" version="1" comment="gjs-tests is &lt;1.52.3-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824982" version="1" comment="glade is &lt;3.22.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824983" version="1" comment="glade-devel is &lt;3.22.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824984" version="1" comment="glade-libs is &lt;3.22.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824985" version="1" comment="glib-networking is &lt;2.56.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824986" version="1" comment="glib-networking-tests is &lt;2.56.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824987" version="1" comment="glib2 is &lt;2.56.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824988" version="1" comment="glib2-devel is &lt;2.56.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824989" version="1" comment="glib2-doc is &lt;2.56.1-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824990" version="1" comment="glib2-fam is &lt;2.56.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824991" version="1" comment="glib2-static is &lt;2.56.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824992" version="1" comment="glib2-tests is &lt;2.56.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824993" version="1" comment="glibmm24 is &lt;2.56.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824994" version="1" comment="glibmm24-devel is &lt;2.56.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824995" version="1" comment="glibmm24-doc is &lt;2.56.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824996" version="1" comment="gnome-backgrounds is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824997" version="1" comment="gnome-bluetooth is &lt;3.28.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824998" version="1" comment="gnome-bluetooth-libs is &lt;3.28.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009824999" version="1" comment="gnome-bluetooth-libs-devel is &lt;3.28.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825000" version="1" comment="gnome-boxes is &lt;3.28.5-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825001" version="1" comment="gnome-calculator is &lt;3.28.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825002" version="1" comment="gnome-classic-session is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825003" version="1" comment="gnome-clocks is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825004" version="1" comment="gnome-color-manager is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825005" version="1" comment="gnome-contacts is &lt;3.28.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825006" version="1" comment="gnome-desktop3 is &lt;3.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825007" version="1" comment="gnome-desktop3-devel is &lt;3.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825008" version="1" comment="gnome-desktop3-tests is &lt;3.28.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825009" version="1" comment="gnome-devel-docs is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825010" version="1" comment="gnome-dictionary is &lt;3.26.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825011" version="1" comment="gnome-disk-utility is &lt;3.28.3-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825012" version="1" comment="gnome-documents is &lt;3.28.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825013" version="1" comment="gnome-documents-libs is &lt;3.28.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825014" version="1" comment="gnome-font-viewer is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825015" version="1" comment="gnome-getting-started-docs is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825016" version="1" comment="gnome-getting-started-docs-cs is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825017" version="1" comment="gnome-getting-started-docs-de is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825018" version="1" comment="gnome-getting-started-docs-es is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825019" version="1" comment="gnome-getting-started-docs-fr is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825020" version="1" comment="gnome-getting-started-docs-gl is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825021" version="1" comment="gnome-getting-started-docs-hu is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825022" version="1" comment="gnome-getting-started-docs-it is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825023" version="1" comment="gnome-getting-started-docs-pl is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825024" version="1" comment="gnome-getting-started-docs-pt_BR is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825025" version="1" comment="gnome-getting-started-docs-ru is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825026" version="1" comment="gnome-initial-setup is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825027" version="1" comment="gnome-keyring is &lt;3.28.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825028" version="1" comment="gnome-keyring-pam is &lt;3.28.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825029" version="1" comment="gnome-online-accounts is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825030" version="1" comment="gnome-online-accounts-devel is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825031" version="1" comment="gnome-online-miners is &lt;3.26.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825032" version="1" comment="gnome-packagekit is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825033" version="1" comment="gnome-packagekit-common is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825034" version="1" comment="gnome-packagekit-installer is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825035" version="1" comment="gnome-packagekit-updater is &lt;3.28.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825036" version="1" comment="gnome-screenshot is &lt;3.26.0-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825037" version="1" comment="gnome-session is &lt;3.28.1-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825038" version="1" comment="gnome-session-custom-session is &lt;3.28.1-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825039" version="1" comment="gnome-session-wayland-session is &lt;3.28.1-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825040" version="1" comment="gnome-session-xsession is &lt;3.28.1-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825041" version="1" comment="gnome-settings-daemon is &lt;3.28.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825042" version="1" comment="gnome-settings-daemon-devel is &lt;3.28.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825043" version="1" comment="gnome-shell is &lt;3.28.3-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825044" version="1" comment="gnome-shell-extension-alternate-tab is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825045" version="1" comment="gnome-shell-extension-apps-menu is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825046" version="1" comment="gnome-shell-extension-auto-move-windows is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825047" version="1" comment="gnome-shell-extension-common is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825048" version="1" comment="gnome-shell-extension-dash-to-dock is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825049" version="1" comment="gnome-shell-extension-drive-menu is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825050" version="1" comment="gnome-shell-extension-launch-new-instance is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825051" version="1" comment="gnome-shell-extension-native-window-placement is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825052" version="1" comment="gnome-shell-extension-no-hot-corner is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825053" version="1" comment="gnome-shell-extension-panel-favorites is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825054" version="1" comment="gnome-shell-extension-places-menu is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825055" version="1" comment="gnome-shell-extension-screenshot-window-sizer is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825056" version="1" comment="gnome-shell-extension-systemMonitor is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825057" version="1" comment="gnome-shell-extension-top-icons is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825058" version="1" comment="gnome-shell-extension-updates-dialog is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825059" version="1" comment="gnome-shell-extension-user-theme is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825060" version="1" comment="gnome-shell-extension-window-list is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825061" version="1" comment="gnome-shell-extension-windowsNavigator is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825062" version="1" comment="gnome-shell-extension-workspace-indicator is &lt;3.28.1-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825063" version="1" comment="gnome-software is &lt;3.28.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825064" version="1" comment="gnome-software-devel is &lt;3.28.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825065" version="1" comment="gnome-software-editor is &lt;3.28.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825066" version="1" comment="gnome-system-monitor is &lt;3.28.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825067" version="1" comment="gnome-terminal is &lt;3.28.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825068" version="1" comment="gnome-terminal-nautilus is &lt;3.28.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825069" version="1" comment="gnome-themes-standard is &lt;3.28-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825070" version="1" comment="gnome-tweak-tool is &lt;3.28.1-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825071" version="1" comment="gnome-user-docs is &lt;3.28.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825072" version="1" comment="gnote is &lt;3.28.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825073" version="1" comment="gobject-introspection is &lt;1.56.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825074" version="1" comment="gobject-introspection-devel is &lt;1.56.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825075" version="1" comment="gom is &lt;0.3.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825076" version="1" comment="gom-devel is &lt;0.3.3-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825077" version="1" comment="google-noto-emoji-color-fonts is &lt;20180508-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825078" version="1" comment="google-noto-emoji-fonts is &lt;20180508-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825079" version="1" comment="grilo is &lt;0.3.6-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825080" version="1" comment="grilo-devel is &lt;0.3.6-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825081" version="1" comment="grilo-plugins is &lt;0.3.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825082" version="1" comment="gsettings-desktop-schemas is &lt;3.28.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825083" version="1" comment="gsettings-desktop-schemas-devel is &lt;3.28.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825084" version="1" comment="gspell is &lt;1.6.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825085" version="1" comment="gspell-devel is &lt;1.6.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825086" version="1" comment="gspell-doc is &lt;1.6.1-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825087" version="1" comment="gssdp is &lt;1.0.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825088" version="1" comment="gssdp-devel is &lt;1.0.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825089" version="1" comment="gssdp-docs is &lt;1.0.2-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825090" version="1" comment="gssdp-utils is &lt;1.0.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825091" version="1" comment="gstreamer1-plugins-base is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825092" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.10.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825093" version="1" comment="gstreamer1-plugins-base-devel-docs is &lt;1.10.4-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825094" version="1" comment="gstreamer1-plugins-base-tools is &lt;1.10.4-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825095" version="1" comment="gtk-doc is &lt;1.28-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825096" version="1" comment="gtk-update-icon-cache is &lt;3.22.30-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825097" version="1" comment="gtk3 is &lt;3.22.30-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825098" version="1" comment="gtk3-devel is &lt;3.22.30-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825099" version="1" comment="gtk3-devel-docs is &lt;3.22.30-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825100" version="1" comment="gtk3-immodule-xim is &lt;3.22.30-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825101" version="1" comment="gtk3-immodules is &lt;3.22.30-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825102" version="1" comment="gtk3-tests is &lt;3.22.30-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825103" version="1" comment="gtksourceview3 is &lt;3.24.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825104" version="1" comment="gtksourceview3-devel is &lt;3.24.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825105" version="1" comment="gtksourceview3-tests is &lt;3.24.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825106" version="1" comment="gucharmap is &lt;10.0.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825107" version="1" comment="gucharmap-devel is &lt;10.0.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825108" version="1" comment="gucharmap-libs is &lt;10.0.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825109" version="1" comment="gupnp is &lt;1.0.2-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825110" version="1" comment="gupnp-devel is &lt;1.0.2-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825111" version="1" comment="gupnp-docs is &lt;1.0.2-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825112" version="1" comment="gupnp-igd is &lt;0.2.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825113" version="1" comment="gupnp-igd-devel is &lt;0.2.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825114" version="1" comment="gupnp-igd-python is &lt;0.2.5-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825115" version="1" comment="gvfs is &lt;1.36.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825116" version="1" comment="gvfs-afc is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825117" version="1" comment="gvfs-afp is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825118" version="1" comment="gvfs-archive is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825119" version="1" comment="gvfs-client is &lt;1.36.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825120" version="1" comment="gvfs-devel is &lt;1.36.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825121" version="1" comment="gvfs-fuse is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825122" version="1" comment="gvfs-goa is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825123" version="1" comment="gvfs-gphoto2 is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825124" version="1" comment="gvfs-mtp is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825125" version="1" comment="gvfs-smb is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825126" version="1" comment="gvfs-tests is &lt;1.36.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825127" version="1" comment="harfbuzz is &lt;1.7.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825128" version="1" comment="harfbuzz-devel is &lt;1.7.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825129" version="1" comment="harfbuzz-icu is &lt;1.7.5-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825130" version="1" comment="json-glib is &lt;1.4.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825131" version="1" comment="json-glib-devel is &lt;1.4.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825132" version="1" comment="json-glib-tests is &lt;1.4.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825133" version="1" comment="libappstream-glib is &lt;0.7.8-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825134" version="1" comment="libappstream-glib-builder is &lt;0.7.8-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825135" version="1" comment="libappstream-glib-builder-devel is &lt;0.7.8-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825136" version="1" comment="libappstream-glib-devel is &lt;0.7.8-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825137" version="1" comment="libchamplain is &lt;0.12.16-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825138" version="1" comment="libchamplain-demos is &lt;0.12.16-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825139" version="1" comment="libchamplain-devel is &lt;0.12.16-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825140" version="1" comment="libchamplain-gtk is &lt;0.12.16-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825141" version="1" comment="libcroco is &lt;0.6.12-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825142" version="1" comment="libcroco-devel is &lt;0.6.12-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825143" version="1" comment="libgdata is &lt;0.17.9-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825144" version="1" comment="libgdata-devel is &lt;0.17.9-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825145" version="1" comment="libgee is &lt;0.20.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825146" version="1" comment="libgee-devel is &lt;0.20.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825147" version="1" comment="libgepub is &lt;0.6.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825148" version="1" comment="libgepub-devel is &lt;0.6.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825149" version="1" comment="libgexiv2 is &lt;0.10.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825150" version="1" comment="libgexiv2-devel is &lt;0.10.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825151" version="1" comment="libgnomekbd is &lt;3.26.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825152" version="1" comment="libgnomekbd-devel is &lt;3.26.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825153" version="1" comment="libgovirt is &lt;0.3.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825154" version="1" comment="libgovirt-devel is &lt;0.3.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825155" version="1" comment="libgtop2 is &lt;2.38.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825156" version="1" comment="libgtop2-devel is &lt;2.38.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825157" version="1" comment="libgweather is &lt;3.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825158" version="1" comment="libgweather-devel is &lt;3.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825159" version="1" comment="libgxps is &lt;0.3.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825160" version="1" comment="libgxps-devel is &lt;0.3.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825161" version="1" comment="libgxps-tools is &lt;0.3.0-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825162" version="1" comment="libical is &lt;3.0.3-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825163" version="1" comment="libical-devel is &lt;3.0.3-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825164" version="1" comment="libical-glib is &lt;3.0.3-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825165" version="1" comment="libical-glib-devel is &lt;3.0.3-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825166" version="1" comment="libical-glib-doc is &lt;3.0.3-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825167" version="1" comment="libjpeg-turbo is &lt;1.2.90-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825168" version="1" comment="libjpeg-turbo-devel is &lt;1.2.90-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825169" version="1" comment="libjpeg-turbo-static is &lt;1.2.90-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825170" version="1" comment="libjpeg-turbo-utils is &lt;1.2.90-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825171" version="1" comment="libmediaart is &lt;1.9.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825172" version="1" comment="libmediaart-devel is &lt;1.9.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825173" version="1" comment="libmediaart-tests is &lt;1.9.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825174" version="1" comment="libosinfo is &lt;1.1.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825175" version="1" comment="libosinfo-devel is &lt;1.1.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825176" version="1" comment="libosinfo-vala is &lt;1.1.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825177" version="1" comment="libpeas is &lt;1.22.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825178" version="1" comment="libpeas-devel is &lt;1.22.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825179" version="1" comment="libpeas-gtk is &lt;1.22.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825180" version="1" comment="libpeas-loader-python is &lt;1.22.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825181" version="1" comment="librsvg2 is &lt;2.40.20-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825182" version="1" comment="librsvg2-devel is &lt;2.40.20-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825183" version="1" comment="librsvg2-tools is &lt;2.40.20-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825184" version="1" comment="libsecret is &lt;0.18.6-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825185" version="1" comment="libsecret-devel is &lt;0.18.6-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825186" version="1" comment="libsoup is &lt;2.62.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825187" version="1" comment="libsoup-devel is &lt;2.62.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825188" version="1" comment="libwayland-client is &lt;1.15.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825189" version="1" comment="libwayland-cursor is &lt;1.15.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825190" version="1" comment="libwayland-egl is &lt;1.15.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825191" version="1" comment="libwayland-server is &lt;1.15.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825192" version="1" comment="libwnck3 is &lt;3.24.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825193" version="1" comment="libwnck3-devel is &lt;3.24.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825194" version="1" comment="mozjs52 is &lt;52.9.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825195" version="1" comment="mozjs52-devel is &lt;52.9.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825196" version="1" comment="mutter is &lt;3.28.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825197" version="1" comment="mutter-devel is &lt;3.28.3-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825198" version="1" comment="nautilus is &lt;3.26.3.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825199" version="1" comment="nautilus-devel is &lt;3.26.3.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825200" version="1" comment="nautilus-extensions is &lt;3.26.3.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825201" version="1" comment="nautilus-sendto is &lt;3.8.6-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825202" version="1" comment="openchange is &lt;2.3-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825203" version="1" comment="openchange-client is &lt;2.3-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825204" version="1" comment="openchange-devel is &lt;2.3-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825205" version="1" comment="openchange-devel-docs is &lt;2.3-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825206" version="1" comment="osinfo-db is &lt;20180531-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825207" version="1" comment="pango is &lt;1.42.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825208" version="1" comment="pango-devel is &lt;1.42.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825209" version="1" comment="pango-tests is &lt;1.42.4-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825210" version="1" comment="poppler is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825211" version="1" comment="poppler-cpp is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825212" version="1" comment="poppler-cpp-devel is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825213" version="1" comment="poppler-demos is &lt;0.26.5-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825214" version="1" comment="poppler-devel is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825215" version="1" comment="poppler-glib is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825216" version="1" comment="poppler-glib-devel is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825217" version="1" comment="poppler-qt is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825218" version="1" comment="poppler-qt-devel is &lt;0.26.5-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825219" version="1" comment="poppler-utils is &lt;0.26.5-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825220" version="1" comment="python2-gexiv2 is &lt;0.10.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825221" version="1" comment="python2-pyatspi is &lt;2.26.0-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825222" version="1" comment="rest is &lt;0.8.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825223" version="1" comment="rest-devel is &lt;0.8.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825224" version="1" comment="rhythmbox is &lt;3.4.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825225" version="1" comment="rhythmbox-devel is &lt;3.4.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825226" version="1" comment="seahorse-nautilus is &lt;3.11.92-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825227" version="1" comment="shotwell is &lt;0.28.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825228" version="1" comment="sushi is &lt;3.28.3-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825229" version="1" comment="totem is &lt;3.26.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825230" version="1" comment="totem-devel is &lt;3.26.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825231" version="1" comment="totem-nautilus is &lt;3.26.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825232" version="1" comment="totem-pl-parser is &lt;3.26.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825233" version="1" comment="totem-pl-parser-devel is &lt;3.26.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825234" version="1" comment="turbojpeg is &lt;1.2.90-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825235" version="1" comment="turbojpeg-devel is &lt;1.2.90-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825236" version="1" comment="upower is &lt;0.99.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825237" version="1" comment="upower-devel is &lt;0.99.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825238" version="1" comment="upower-devel-docs is &lt;0.99.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825239" version="1" comment="vala is &lt;0.40.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825240" version="1" comment="vala-devel is &lt;0.40.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825241" version="1" comment="vala-doc is &lt;0.40.8-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825242" version="1" comment="valadoc is &lt;0.40.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825243" version="1" comment="valadoc-devel is &lt;0.40.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825244" version="1" comment="vino is &lt;3.22.0-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825245" version="1" comment="vte-profile is &lt;0.52.2-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825246" version="1" comment="vte291 is &lt;0.52.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825247" version="1" comment="vte291-devel is &lt;0.52.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825248" version="1" comment="wayland-devel is &lt;1.15.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825249" version="1" comment="wayland-doc is &lt;1.15.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825250" version="1" comment="wayland-protocols-devel is &lt;1.14-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825251" version="1" comment="webkitgtk4 is &lt;2.20.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825252" version="1" comment="webkitgtk4-devel is &lt;2.20.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825253" version="1" comment="webkitgtk4-doc is &lt;2.20.5-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825254" version="1" comment="webkitgtk4-jsc is &lt;2.20.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825255" version="1" comment="webkitgtk4-jsc-devel is &lt;2.20.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825256" version="1" comment="webkitgtk4-plugin-process-gtk2 is &lt;2.20.5-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825257" version="1" comment="xdg-desktop-portal is &lt;1.0.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825258" version="1" comment="xdg-desktop-portal-devel is &lt;1.0.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825259" version="1" comment="xdg-desktop-portal-gtk is &lt;1.0.2-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825260" version="1" comment="yelp is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825261" version="1" comment="yelp-devel is &lt;3.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825262" version="1" comment="yelp-libs is &lt;3.28.1-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825263" version="1" comment="yelp-tools is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825264" version="1" comment="yelp-xsl is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825265" version="1" comment="yelp-xsl-devel is &lt;3.28.0-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825266" version="1" comment="zenity is &lt;3.28.1-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825267" version="1" comment="curl is &lt;7.29.0-51.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825268" version="1" comment="libcurl is &lt;7.29.0-51.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825269" version="1" comment="libcurl-devel is &lt;7.29.0-51.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825270" version="1" comment="nss-pem is &lt;1.0.3-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825271" version="1" comment="libipa_hbac is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825272" version="1" comment="libipa_hbac-devel is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825273" version="1" comment="libsss_autofs is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825274" version="1" comment="libsss_certmap is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825275" version="1" comment="libsss_certmap-devel is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825276" version="1" comment="libsss_idmap is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825277" version="1" comment="libsss_idmap-devel is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825278" version="1" comment="libsss_nss_idmap is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825279" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825280" version="1" comment="libsss_simpleifp is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825281" version="1" comment="libsss_simpleifp-devel is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825282" version="1" comment="libsss_sudo is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825283" version="1" comment="python-libipa_hbac is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825284" version="1" comment="python-libsss_nss_idmap is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825285" version="1" comment="python-sss is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825286" version="1" comment="python-sss-murmur is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825287" version="1" comment="python-sssdconfig is &lt;1.16.2-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825288" version="1" comment="sssd is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825289" version="1" comment="sssd-ad is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825290" version="1" comment="sssd-client is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825291" version="1" comment="sssd-common is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825292" version="1" comment="sssd-common-pac is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825293" version="1" comment="sssd-dbus is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825294" version="1" comment="sssd-ipa is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825295" version="1" comment="sssd-kcm is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825296" version="1" comment="sssd-krb5 is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825297" version="1" comment="sssd-krb5-common is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825298" version="1" comment="sssd-ldap is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825299" version="1" comment="sssd-libwbclient is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825300" version="1" comment="sssd-libwbclient-devel is &lt;1.16.2-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825301" version="1" comment="sssd-polkit-rules is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825302" version="1" comment="sssd-proxy is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825303" version="1" comment="sssd-tools is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825304" version="1" comment="sssd-winbind-idmap is &lt;1.16.2-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825305" version="1" comment="openssl is &lt;1.0.2k-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825306" version="1" comment="openssl-devel is &lt;1.0.2k-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825307" version="1" comment="openssl-libs is &lt;1.0.2k-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825308" version="1" comment="openssl-perl is &lt;1.0.2k-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825309" version="1" comment="openssl-static is &lt;1.0.2k-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825310" version="1" comment="zziplib is &lt;0.13.62-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825311" version="1" comment="zziplib-devel is &lt;0.13.62-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825312" version="1" comment="zziplib-utils is &lt;0.13.62-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825313" version="1" comment="glusterfs is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825314" version="1" comment="glusterfs-api is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825315" version="1" comment="glusterfs-api-devel is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825316" version="1" comment="glusterfs-cli is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825317" version="1" comment="glusterfs-client-xlators is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825318" version="1" comment="glusterfs-devel is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825319" version="1" comment="glusterfs-fuse is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825320" version="1" comment="glusterfs-libs is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825321" version="1" comment="glusterfs-rdma is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825322" version="1" comment="python2-gluster is &lt;3.12.2-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825323" version="1" comment="libcdio is &lt;0.92-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825324" version="1" comment="libcdio-devel is &lt;0.92-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825325" version="1" comment="setup is &lt;2.8.71-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825326" version="1" comment="jasper is &lt;1.900.1-33.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825327" version="1" comment="jasper-devel is &lt;1.900.1-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825328" version="1" comment="jasper-libs is &lt;1.900.1-33.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825329" version="1" comment="jasper-utils is &lt;1.900.1-33.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825330" version="1" comment="fuse is &lt;2.9.2-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825331" version="1" comment="fuse-devel is &lt;2.9.2-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825332" version="1" comment="fuse-libs is &lt;2.9.2-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825333" version="1" comment="libmspack is &lt;0.5-0.6.alpha.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825334" version="1" comment="libmspack-devel is &lt;0.5-0.6.alpha.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825335" version="1" comment="xerces-c is &lt;3.1.1-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825336" version="1" comment="xerces-c-devel is &lt;3.1.1-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825337" version="1" comment="xerces-c-doc is &lt;3.1.1-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825338" version="1" comment="python-paramiko is &lt;2.1.1-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825339" version="1" comment="python-paramiko-doc is &lt;2.1.1-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825340" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.201-2.6.16.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825341" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.201-2.6.16.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825342" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.201-2.6.16.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825343" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.201-2.6.16.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825344" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.201-2.6.16.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825345" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.201-2.6.16.1.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825346" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.201-2.6.16.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825347" version="1" comment="emacs-git is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825348" version="1" comment="emacs-git-el is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825349" version="1" comment="git is &lt;1.8.3.1-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825350" version="1" comment="git-all is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825351" version="1" comment="git-bzr is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825352" version="1" comment="git-cvs is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825353" version="1" comment="git-daemon is &lt;1.8.3.1-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825354" version="1" comment="git-email is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825355" version="1" comment="git-gnome-keyring is &lt;1.8.3.1-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825356" version="1" comment="git-gui is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825357" version="1" comment="git-hg is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825358" version="1" comment="git-instaweb is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825359" version="1" comment="git-p4 is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825360" version="1" comment="git-svn is &lt;1.8.3.1-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825361" version="1" comment="gitk is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825362" version="1" comment="gitweb is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825363" version="1" comment="perl-Git is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825364" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-20.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825365" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.1-5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825366" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.1-5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825367" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.1-5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825368" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.1-5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825369" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.1-5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825370" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.1-5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825371" version="1" comment="xorg-x11-server-common is &lt;1.20.1-5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825372" version="1" comment="xorg-x11-server-devel is &lt;1.20.1-5.1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825373" version="1" comment="xorg-x11-server-source is &lt;1.20.1-5.1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825374" version="1" comment="thunderbird is &lt;60.2.1-4.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825375" version="1" comment="java-11-openjdk is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825376" version="1" comment="java-11-openjdk-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825377" version="1" comment="java-11-openjdk-demo is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825378" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825379" version="1" comment="java-11-openjdk-devel is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825380" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825381" version="1" comment="java-11-openjdk-headless is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825382" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825383" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825384" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825385" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825386" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825387" version="1" comment="java-11-openjdk-jmods is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825388" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825389" version="1" comment="java-11-openjdk-src is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825390" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.1.13-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825391" version="1" comment="thunderbird is &lt;60.3.0-1.el7_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825392" version="1" comment="ghostscript is &lt;9.07-31.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825393" version="1" comment="ghostscript-cups is &lt;9.07-31.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825394" version="1" comment="ghostscript-devel is &lt;9.07-31.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825395" version="1" comment="ghostscript-doc is &lt;9.07-31.el7_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825396" version="1" comment="ghostscript-gtk is &lt;9.07-31.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825397" version="1" comment="bpftool is &lt;3.10.0-957.1.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825398" version="1" comment="kernel is &lt;3.10.0-957.1.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825399" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.1.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825400" version="1" comment="kernel-debug is &lt;3.10.0-957.1.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825403" version="1" comment="kernel-doc is &lt;3.10.0-957.1.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825404" version="1" comment="kernel-headers is &lt;3.10.0-957.1.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825405" version="1" comment="kernel-tools is &lt;3.10.0-957.1.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825406" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.1.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825408" version="1" comment="perf is &lt;3.10.0-957.1.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825409" version="1" comment="python-perf is &lt;3.10.0-957.1.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825410" version="1" comment="sos-collector is &lt;1.5-3.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825411" version="1" comment="NetworkManager is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825412" version="1" comment="NetworkManager-adsl is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825413" version="1" comment="NetworkManager-bluetooth is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825414" version="1" comment="NetworkManager-config-server is &lt;1.12.0-8.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825415" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.12.0-8.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825416" version="1" comment="NetworkManager-glib is &lt;1.12.0-8.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825417" version="1" comment="NetworkManager-glib-devel is &lt;1.12.0-8.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825418" version="1" comment="NetworkManager-libnm is &lt;1.12.0-8.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825419" version="1" comment="NetworkManager-libnm-devel is &lt;1.12.0-8.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825420" version="1" comment="NetworkManager-ovs is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825421" version="1" comment="NetworkManager-ppp is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825422" version="1" comment="NetworkManager-team is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825423" version="1" comment="NetworkManager-tui is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825424" version="1" comment="NetworkManager-wifi is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825425" version="1" comment="NetworkManager-wwan is &lt;1.12.0-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825426" version="1" comment="ruby is &lt;2.0.0.648-34.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825427" version="1" comment="ruby-devel is &lt;2.0.0.648-34.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825428" version="1" comment="ruby-doc is &lt;2.0.0.648-34.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825429" version="1" comment="ruby-irb is &lt;2.0.0.648-34.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825430" version="1" comment="ruby-libs is &lt;2.0.0.648-34.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825431" version="1" comment="ruby-tcltk is &lt;2.0.0.648-34.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825432" version="1" comment="rubygem-bigdecimal is &lt;1.2.0-34.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825433" version="1" comment="rubygem-io-console is &lt;0.4.2-34.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825434" version="1" comment="rubygem-json is &lt;1.7.7-34.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825435" version="1" comment="rubygem-minitest is &lt;4.3.2-34.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825436" version="1" comment="rubygem-psych is &lt;2.0.0-34.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825437" version="1" comment="rubygem-rake is &lt;0.9.6-34.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825438" version="1" comment="rubygem-rdoc is &lt;4.0.0-34.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825439" version="1" comment="rubygems is &lt;2.0.14.1-34.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825440" version="1" comment="rubygems-devel is &lt;2.0.14.1-34.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825441" version="1" comment="ghostscript is &lt;9.07-31.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825442" version="1" comment="ghostscript-cups is &lt;9.07-31.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825443" version="1" comment="ghostscript-devel is &lt;9.07-31.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825444" version="1" comment="ghostscript-doc is &lt;9.07-31.el7_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825445" version="1" comment="ghostscript-gtk is &lt;9.07-31.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825446" version="1" comment="firefox is &lt;60.4.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825447" version="1" comment="ghostscript is &lt;9.07-31.el7_6.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825448" version="1" comment="ghostscript-cups is &lt;9.07-31.el7_6.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825449" version="1" comment="ghostscript-devel is &lt;9.07-31.el7_6.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825450" version="1" comment="ghostscript-doc is &lt;9.07-31.el7_6.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825451" version="1" comment="ghostscript-gtk is &lt;9.07-31.el7_6.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825452" version="1" comment="keepalived is &lt;1.3.5-8.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825453" version="1" comment="libgudev1 is &lt;219-62.el7_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825454" version="1" comment="libgudev1-devel is &lt;219-62.el7_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825455" version="1" comment="systemd is &lt;219-62.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825456" version="1" comment="systemd-devel is &lt;219-62.el7_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825457" version="1" comment="systemd-journal-gateway is &lt;219-62.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825458" version="1" comment="systemd-libs is &lt;219-62.el7_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825459" version="1" comment="systemd-networkd is &lt;219-62.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825460" version="1" comment="systemd-python is &lt;219-62.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825461" version="1" comment="systemd-resolved is &lt;219-62.el7_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825462" version="1" comment="systemd-sysv is &lt;219-62.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825463" version="1" comment="libvncserver is &lt;0.9.9-13.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825464" version="1" comment="libvncserver-devel is &lt;0.9.9-13.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825465" version="1" comment="perl is &lt;5.16.3-294.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825466" version="1" comment="perl-CPAN is &lt;1.9800-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825467" version="1" comment="perl-ExtUtils-CBuilder is &lt;0.28.2.6-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825468" version="1" comment="perl-ExtUtils-Embed is &lt;1.30-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825469" version="1" comment="perl-ExtUtils-Install is &lt;1.58-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825470" version="1" comment="perl-IO-Zlib is &lt;1.10-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825471" version="1" comment="perl-Locale-Maketext-Simple is &lt;0.21-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825472" version="1" comment="perl-Module-CoreList is &lt;2.76.02-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825473" version="1" comment="perl-Module-Loaded is &lt;0.08-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825474" version="1" comment="perl-Object-Accessor is &lt;0.42-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825475" version="1" comment="perl-Package-Constants is &lt;0.02-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825476" version="1" comment="perl-Pod-Escapes is &lt;1.04-294.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825477" version="1" comment="perl-Time-Piece is &lt;1.20.1-294.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825478" version="1" comment="perl-core is &lt;5.16.3-294.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825479" version="1" comment="perl-devel is &lt;5.16.3-294.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825480" version="1" comment="perl-libs is &lt;5.16.3-294.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825481" version="1" comment="perl-macros is &lt;5.16.3-294.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825482" version="1" comment="perl-tests is &lt;5.16.3-294.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825483" version="1" comment="thunderbird is &lt;60.4.0-1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825484" version="1" comment="bpftool is &lt;3.10.0-957.5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825485" version="1" comment="kernel is &lt;3.10.0-957.5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825486" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.5.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825487" version="1" comment="kernel-debug is &lt;3.10.0-957.5.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825490" version="1" comment="kernel-doc is &lt;3.10.0-957.5.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825491" version="1" comment="kernel-headers is &lt;3.10.0-957.5.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825492" version="1" comment="kernel-tools is &lt;3.10.0-957.5.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825493" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.5.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825495" version="1" comment="perf is &lt;3.10.0-957.5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825496" version="1" comment="python-perf is &lt;3.10.0-957.5.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825497" version="1" comment="bind is &lt;9.9.4-73.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825498" version="1" comment="bind-chroot is &lt;9.9.4-73.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825499" version="1" comment="bind-devel is &lt;9.9.4-73.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825500" version="1" comment="bind-libs is &lt;9.9.4-73.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825501" version="1" comment="bind-libs-lite is &lt;9.9.4-73.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825502" version="1" comment="bind-license is &lt;9.9.4-73.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825503" version="1" comment="bind-lite-devel is &lt;9.9.4-73.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825504" version="1" comment="bind-pkcs11 is &lt;9.9.4-73.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825505" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-73.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825506" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-73.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825507" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-73.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825508" version="1" comment="bind-sdb is &lt;9.9.4-73.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825509" version="1" comment="bind-sdb-chroot is &lt;9.9.4-73.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825510" version="1" comment="bind-utils is &lt;9.9.4-73.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825511" version="1" comment="libgudev1 is &lt;219-62.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825512" version="1" comment="libgudev1-devel is &lt;219-62.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825513" version="1" comment="systemd is &lt;219-62.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825514" version="1" comment="systemd-devel is &lt;219-62.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825515" version="1" comment="systemd-journal-gateway is &lt;219-62.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825516" version="1" comment="systemd-libs is &lt;219-62.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825517" version="1" comment="systemd-networkd is &lt;219-62.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825518" version="1" comment="systemd-python is &lt;219-62.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825519" version="1" comment="systemd-resolved is &lt;219-62.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825520" version="1" comment="systemd-sysv is &lt;219-62.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825521" version="1" comment="firefox is &lt;60.5.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825522" version="1" comment="ghostscript is &lt;9.07-31.el7_6.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825523" version="1" comment="ghostscript-cups is &lt;9.07-31.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825524" version="1" comment="ghostscript-devel is &lt;9.07-31.el7_6.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825525" version="1" comment="ghostscript-doc is &lt;9.07-31.el7_6.9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825526" version="1" comment="ghostscript-gtk is &lt;9.07-31.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825527" version="1" comment="polkit is &lt;0.112-18.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825528" version="1" comment="polkit-devel is &lt;0.112-18.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825529" version="1" comment="polkit-docs is &lt;0.112-18.el7_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825530" version="1" comment="spice-server is &lt;0.14.0-6.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825531" version="1" comment="spice-server-devel is &lt;0.14.0-6.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825532" version="1" comment="thunderbird is &lt;60.5.0-1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825533" version="1" comment="libgudev1 is &lt;219-62.el7_6.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825534" version="1" comment="libgudev1-devel is &lt;219-62.el7_6.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825535" version="1" comment="systemd is &lt;219-62.el7_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825536" version="1" comment="systemd-devel is &lt;219-62.el7_6.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825537" version="1" comment="systemd-journal-gateway is &lt;219-62.el7_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825538" version="1" comment="systemd-libs is &lt;219-62.el7_6.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825539" version="1" comment="systemd-networkd is &lt;219-62.el7_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825540" version="1" comment="systemd-python is &lt;219-62.el7_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825541" version="1" comment="systemd-resolved is &lt;219-62.el7_6.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825542" version="1" comment="systemd-sysv is &lt;219-62.el7_6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825543" version="1" comment="firefox is &lt;60.5.1-1.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825544" version="1" comment="flatpak is &lt;1.0.2-4.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825545" version="1" comment="flatpak-builder is &lt;1.0.0-4.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825546" version="1" comment="flatpak-devel is &lt;1.0.2-4.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825547" version="1" comment="flatpak-libs is &lt;1.0.2-4.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825548" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825549" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825550" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825551" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825552" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825553" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825554" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825555" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825556" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825557" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825558" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.201.b09-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825559" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.201.b09-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825560" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.201.b09-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825561" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.201.b09-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825562" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825563" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.201.b09-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825564" version="1" comment="java-11-openjdk is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825565" version="1" comment="java-11-openjdk-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825566" version="1" comment="java-11-openjdk-demo is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825567" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825568" version="1" comment="java-11-openjdk-devel is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825569" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825570" version="1" comment="java-11-openjdk-headless is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825571" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825572" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825573" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825574" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825575" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825576" version="1" comment="java-11-openjdk-jmods is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825577" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825578" version="1" comment="java-11-openjdk-src is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825579" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.2.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825580" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.211-2.6.17.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825581" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.211-2.6.17.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825582" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.211-2.6.17.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825583" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.211-2.6.17.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825584" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.211-2.6.17.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825585" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.211-2.6.17.1.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825586" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.211-2.6.17.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825587" version="1" comment="openssl is &lt;1.0.2k-16.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825588" version="1" comment="openssl-devel is &lt;1.0.2k-16.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825589" version="1" comment="openssl-libs is &lt;1.0.2k-16.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825590" version="1" comment="openssl-perl is &lt;1.0.2k-16.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825591" version="1" comment="openssl-static is &lt;1.0.2k-16.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825592" version="1" comment="tomcat is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825593" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825594" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825595" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825596" version="1" comment="tomcat-javadoc is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825597" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825598" version="1" comment="tomcat-jsvc is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825599" version="1" comment="tomcat-lib is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825600" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825601" version="1" comment="tomcat-webapps is &lt;7.0.76-9.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825602" version="1" comment="bpftool is &lt;3.10.0-957.10.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825603" version="1" comment="kernel is &lt;3.10.0-957.10.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825604" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.10.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825605" version="1" comment="kernel-debug is &lt;3.10.0-957.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825608" version="1" comment="kernel-doc is &lt;3.10.0-957.10.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825609" version="1" comment="kernel-headers is &lt;3.10.0-957.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825610" version="1" comment="kernel-tools is &lt;3.10.0-957.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825611" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.10.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825613" version="1" comment="perf is &lt;3.10.0-957.10.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825614" version="1" comment="python-perf is &lt;3.10.0-957.10.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825615" version="1" comment="cloud-init is &lt;18.2-1.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825616" version="1" comment="firefox is &lt;60.6.0-3.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825617" version="1" comment="ghostscript is &lt;9.07-31.el7_6.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825618" version="1" comment="ghostscript-cups is &lt;9.07-31.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825619" version="1" comment="ghostscript-devel is &lt;9.07-31.el7_6.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825620" version="1" comment="ghostscript-doc is &lt;9.07-31.el7_6.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825621" version="1" comment="ghostscript-gtk is &lt;9.07-31.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825622" version="1" comment="libwsman-devel is &lt;2.6.3-6.git4391e5c.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825623" version="1" comment="libwsman1 is &lt;2.6.3-6.git4391e5c.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825624" version="1" comment="openwsman-client is &lt;2.6.3-6.git4391e5c.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825625" version="1" comment="openwsman-perl is &lt;2.6.3-6.git4391e5c.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825626" version="1" comment="openwsman-python is &lt;2.6.3-6.git4391e5c.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825627" version="1" comment="openwsman-ruby is &lt;2.6.3-6.git4391e5c.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825628" version="1" comment="openwsman-server is &lt;2.6.3-6.git4391e5c.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825629" version="1" comment="firefox is &lt;60.6.1-1.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825630" version="1" comment="libssh2 is &lt;1.4.3-12.el7_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825631" version="1" comment="libssh2-devel is &lt;1.4.3-12.el7_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825632" version="1" comment="libssh2-docs is &lt;1.4.3-12.el7_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825633" version="1" comment="thunderbird is &lt;60.6.1-1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825634" version="1" comment="freerdp is &lt;1.0.2-15.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825635" version="1" comment="freerdp-devel is &lt;1.0.2-15.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825636" version="1" comment="freerdp-libs is &lt;1.0.2-15.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825637" version="1" comment="freerdp-plugins is &lt;1.0.2-15.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825638" version="1" comment="python is &lt;2.7.5-77.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825639" version="1" comment="python-debug is &lt;2.7.5-77.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825640" version="1" comment="python-devel is &lt;2.7.5-77.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825641" version="1" comment="python-libs is &lt;2.7.5-77.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825642" version="1" comment="python-test is &lt;2.7.5-77.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825643" version="1" comment="python-tools is &lt;2.7.5-77.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825644" version="1" comment="tkinter is &lt;2.7.5-77.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825645" version="1" comment="mod_auth_mellon is &lt;0.14.0-2.el7_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825646" version="1" comment="mod_auth_mellon-diagnostics is &lt;0.14.0-2.el7_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825647" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825648" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825649" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825650" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825651" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825652" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825653" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825654" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825655" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825656" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825657" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.212.b04-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825658" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.212.b04-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825659" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.212.b04-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825660" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.212.b04-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825661" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825662" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.212.b04-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825663" version="1" comment="java-11-openjdk is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825664" version="1" comment="java-11-openjdk-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825665" version="1" comment="java-11-openjdk-demo is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825666" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825667" version="1" comment="java-11-openjdk-devel is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825668" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825669" version="1" comment="java-11-openjdk-headless is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825670" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825671" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825672" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825673" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825674" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825675" version="1" comment="java-11-openjdk-jmods is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825676" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825677" version="1" comment="java-11-openjdk-src is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825678" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.3.7-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825679" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.221-2.6.18.0.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825680" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.221-2.6.18.0.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825681" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.221-2.6.18.0.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825682" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.221-2.6.18.0.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825683" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.221-2.6.18.0.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825684" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.221-2.6.18.0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825685" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.221-2.6.18.0.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825686" version="1" comment="OVMF is &lt;20180508-3.gitee3198e672e2.el7_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825687" version="1" comment="bpftool is &lt;3.10.0-957.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825688" version="1" comment="kernel is &lt;3.10.0-957.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825689" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.12.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825690" version="1" comment="kernel-debug is &lt;3.10.0-957.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825693" version="1" comment="kernel-doc is &lt;3.10.0-957.12.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825694" version="1" comment="kernel-headers is &lt;3.10.0-957.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825695" version="1" comment="kernel-tools is &lt;3.10.0-957.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825696" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825698" version="1" comment="perf is &lt;3.10.0-957.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825699" version="1" comment="python-perf is &lt;3.10.0-957.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825700" version="1" comment="ghostscript is &lt;9.07-31.el7_6.11 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825701" version="1" comment="ghostscript-cups is &lt;9.07-31.el7_6.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825702" version="1" comment="ghostscript-devel is &lt;9.07-31.el7_6.11 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825703" version="1" comment="ghostscript-doc is &lt;9.07-31.el7_6.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825704" version="1" comment="ghostscript-gtk is &lt;9.07-31.el7_6.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825705" version="1" comment="python-jinja2 is &lt;2.7.2-3.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825706" version="1" comment="flatpak is &lt;1.0.2-5.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825707" version="1" comment="flatpak-builder is &lt;1.0.0-5.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825708" version="1" comment="flatpak-devel is &lt;1.0.2-5.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825709" version="1" comment="flatpak-libs is &lt;1.0.2-5.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825710" version="1" comment="freeradius is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825711" version="1" comment="freeradius-devel is &lt;3.0.13-10.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825712" version="1" comment="freeradius-doc is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825713" version="1" comment="freeradius-krb5 is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825714" version="1" comment="freeradius-ldap is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825715" version="1" comment="freeradius-mysql is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825716" version="1" comment="freeradius-perl is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825717" version="1" comment="freeradius-postgresql is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825718" version="1" comment="freeradius-python is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825719" version="1" comment="freeradius-sqlite is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825720" version="1" comment="freeradius-unixODBC is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825721" version="1" comment="freeradius-utils is &lt;3.0.13-10.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825722" version="1" comment="bpftool is &lt;3.10.0-957.12.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825723" version="1" comment="kernel is &lt;3.10.0-957.12.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825724" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.12.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825725" version="1" comment="kernel-debug is &lt;3.10.0-957.12.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825728" version="1" comment="kernel-doc is &lt;3.10.0-957.12.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825729" version="1" comment="kernel-headers is &lt;3.10.0-957.12.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825730" version="1" comment="kernel-tools is &lt;3.10.0-957.12.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825731" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.12.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825733" version="1" comment="perf is &lt;3.10.0-957.12.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825734" version="1" comment="python-perf is &lt;3.10.0-957.12.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825735" version="1" comment="libvirt is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825736" version="1" comment="libvirt-admin is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825737" version="1" comment="libvirt-bash-completion is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825738" version="1" comment="libvirt-client is &lt;4.5.0-10.el7_6.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825739" version="1" comment="libvirt-daemon is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825740" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825741" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825742" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825743" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825744" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825745" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825746" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825747" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825748" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825749" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825750" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825751" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825752" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825753" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825754" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825755" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825756" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825757" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825758" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825759" version="1" comment="libvirt-daemon-lxc is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825760" version="1" comment="libvirt-devel is &lt;4.5.0-10.el7_6.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825761" version="1" comment="libvirt-docs is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825762" version="1" comment="libvirt-libs is &lt;4.5.0-10.el7_6.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825763" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825764" version="1" comment="libvirt-login-shell is &lt;4.5.0-10.el7_6.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825765" version="1" comment="libvirt-nss is &lt;4.5.0-10.el7_6.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825766" version="1" comment="qemu-img is &lt;1.5.3-160.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825767" version="1" comment="qemu-kvm is &lt;1.5.3-160.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825768" version="1" comment="qemu-kvm-common is &lt;1.5.3-160.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825769" version="1" comment="qemu-kvm-tools is &lt;1.5.3-160.el7_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825770" version="1" comment="wget is &lt;1.14-18.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825771" version="1" comment="ruby is &lt;2.0.0.648-35.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825772" version="1" comment="ruby-devel is &lt;2.0.0.648-35.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825773" version="1" comment="ruby-doc is &lt;2.0.0.648-35.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825774" version="1" comment="ruby-irb is &lt;2.0.0.648-35.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825775" version="1" comment="ruby-libs is &lt;2.0.0.648-35.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825776" version="1" comment="ruby-tcltk is &lt;2.0.0.648-35.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825777" version="1" comment="rubygem-bigdecimal is &lt;1.2.0-35.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825778" version="1" comment="rubygem-io-console is &lt;0.4.2-35.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825779" version="1" comment="rubygem-json is &lt;1.7.7-35.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825780" version="1" comment="rubygem-minitest is &lt;4.3.2-35.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825781" version="1" comment="rubygem-psych is &lt;2.0.0-35.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825782" version="1" comment="rubygem-rake is &lt;0.9.6-35.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825783" version="1" comment="rubygem-rdoc is &lt;4.0.0-35.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825784" version="1" comment="rubygems is &lt;2.0.14.1-35.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825785" version="1" comment="rubygems-devel is &lt;2.0.14.1-35.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825786" version="1" comment="libvirt is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825787" version="1" comment="libvirt-admin is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825788" version="1" comment="libvirt-bash-completion is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825789" version="1" comment="libvirt-client is &lt;4.5.0-10.el7_6.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825790" version="1" comment="libvirt-daemon is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825791" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825792" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825793" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825794" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825795" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825796" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825797" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825798" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825799" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825800" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825801" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825802" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825803" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825804" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825805" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825806" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825807" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825808" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825809" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825810" version="1" comment="libvirt-daemon-lxc is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825811" version="1" comment="libvirt-devel is &lt;4.5.0-10.el7_6.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825812" version="1" comment="libvirt-docs is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825813" version="1" comment="libvirt-libs is &lt;4.5.0-10.el7_6.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825814" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825815" version="1" comment="libvirt-login-shell is &lt;4.5.0-10.el7_6.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825816" version="1" comment="libvirt-nss is &lt;4.5.0-10.el7_6.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825817" version="1" comment="firefox is &lt;60.7.0-1.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825818" version="1" comment="bind is &lt;9.9.4-74.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825819" version="1" comment="bind-chroot is &lt;9.9.4-74.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825820" version="1" comment="bind-devel is &lt;9.9.4-74.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825821" version="1" comment="bind-libs is &lt;9.9.4-74.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825822" version="1" comment="bind-libs-lite is &lt;9.9.4-74.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825823" version="1" comment="bind-license is &lt;9.9.4-74.el7_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825824" version="1" comment="bind-lite-devel is &lt;9.9.4-74.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825825" version="1" comment="bind-pkcs11 is &lt;9.9.4-74.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825826" version="1" comment="bind-pkcs11-devel is &lt;9.9.4-74.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825827" version="1" comment="bind-pkcs11-libs is &lt;9.9.4-74.el7_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825828" version="1" comment="bind-pkcs11-utils is &lt;9.9.4-74.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825829" version="1" comment="bind-sdb is &lt;9.9.4-74.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825830" version="1" comment="bind-sdb-chroot is &lt;9.9.4-74.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825831" version="1" comment="bind-utils is &lt;9.9.4-74.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825832" version="1" comment="thunderbird is &lt;60.7.0-1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825833" version="1" comment="bpftool is &lt;3.10.0-957.21.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825834" version="1" comment="kernel is &lt;3.10.0-957.21.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825835" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.21.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825836" version="1" comment="kernel-debug is &lt;3.10.0-957.21.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825839" version="1" comment="kernel-doc is &lt;3.10.0-957.21.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825840" version="1" comment="kernel-headers is &lt;3.10.0-957.21.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825841" version="1" comment="kernel-tools is &lt;3.10.0-957.21.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825842" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.21.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825844" version="1" comment="perf is &lt;3.10.0-957.21.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825845" version="1" comment="python-perf is &lt;3.10.0-957.21.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825846" version="1" comment="libvirt is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825847" version="1" comment="libvirt-admin is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825848" version="1" comment="libvirt-bash-completion is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825849" version="1" comment="libvirt-client is &lt;4.5.0-10.el7_6.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825850" version="1" comment="libvirt-daemon is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825851" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825852" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825853" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825854" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825855" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825856" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825857" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825858" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825859" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825860" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825861" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825862" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825863" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825864" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825865" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825866" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825867" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825868" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825869" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825870" version="1" comment="libvirt-daemon-lxc is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825871" version="1" comment="libvirt-devel is &lt;4.5.0-10.el7_6.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825872" version="1" comment="libvirt-docs is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825873" version="1" comment="libvirt-libs is &lt;4.5.0-10.el7_6.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825874" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825875" version="1" comment="libvirt-login-shell is &lt;4.5.0-10.el7_6.12 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825876" version="1" comment="libvirt-nss is &lt;4.5.0-10.el7_6.12 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825877" version="1" comment="python is &lt;2.7.5-80.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825878" version="1" comment="python-debug is &lt;2.7.5-80.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825879" version="1" comment="python-devel is &lt;2.7.5-80.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825880" version="1" comment="python-libs is &lt;2.7.5-80.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825881" version="1" comment="python-test is &lt;2.7.5-80.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825882" version="1" comment="python-tools is &lt;2.7.5-80.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825883" version="1" comment="tkinter is &lt;2.7.5-80.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825884" version="1" comment="firefox is &lt;60.7.2-1.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825885" version="1" comment="vim-X11 is &lt;8.0.1763-11.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825886" version="1" comment="vim-common is &lt;8.0.1763-11.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825887" version="1" comment="vim-enhanced is &lt;8.0.1763-11.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825888" version="1" comment="vim-filesystem is &lt;8.0.1763-11.el8_0 for noarch,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825889" version="1" comment="vim-minimal is &lt;8.0.1763-11.el8_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825890" version="1" comment="thunderbird is &lt;60.7.2-2.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825891" version="1" comment="firefox is &lt;60.8.0-1.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825892" version="1" comment="thunderbird is &lt;60.8.0-1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825893" version="1" comment="java-11-openjdk is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825894" version="1" comment="java-11-openjdk-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825895" version="1" comment="java-11-openjdk-demo is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825896" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825897" version="1" comment="java-11-openjdk-devel is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825898" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825899" version="1" comment="java-11-openjdk-headless is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825900" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825901" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825902" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825903" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825904" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825905" version="1" comment="java-11-openjdk-jmods is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825906" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825907" version="1" comment="java-11-openjdk-src is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825908" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.4.11-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825909" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825910" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825911" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825912" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825913" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825914" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825915" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825916" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825917" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825918" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825919" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.222.b10-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825920" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.222.b10-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825921" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.222.b10-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825922" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.222.b10-0.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825923" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825924" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.222.b10-0.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825925" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.231-2.6.19.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825926" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.231-2.6.19.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825927" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.231-2.6.19.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825928" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.231-2.6.19.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825929" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.231-2.6.19.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825930" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.231-2.6.19.1.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825931" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.231-2.6.19.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825932" version="1" comment="bpftool is &lt;3.10.0-957.27.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825933" version="1" comment="kernel is &lt;3.10.0-957.27.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825934" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-957.27.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825935" version="1" comment="kernel-debug is &lt;3.10.0-957.27.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825938" version="1" comment="kernel-doc is &lt;3.10.0-957.27.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825939" version="1" comment="kernel-headers is &lt;3.10.0-957.27.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825940" version="1" comment="kernel-tools is &lt;3.10.0-957.27.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825941" version="1" comment="kernel-tools-libs is &lt;3.10.0-957.27.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825943" version="1" comment="perf is &lt;3.10.0-957.27.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825944" version="1" comment="python-perf is &lt;3.10.0-957.27.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825945" version="1" comment="curl is &lt;7.29.0-51.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825946" version="1" comment="libcurl is &lt;7.29.0-51.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825947" version="1" comment="libcurl-devel is &lt;7.29.0-51.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825948" version="1" comment="qemu-img is &lt;1.5.3-160.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825949" version="1" comment="qemu-kvm is &lt;1.5.3-160.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825950" version="1" comment="qemu-kvm-common is &lt;1.5.3-160.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825951" version="1" comment="qemu-kvm-tools is &lt;1.5.3-160.el7_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825952" version="1" comment="libssh2 is &lt;1.4.3-12.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825953" version="1" comment="libssh2-devel is &lt;1.4.3-12.el7_6.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825954" version="1" comment="libssh2-docs is &lt;1.4.3-12.el7_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825955" version="1" comment="389-ds-base is &lt;1.3.8.4-25.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825956" version="1" comment="389-ds-base-devel is &lt;1.3.8.4-25.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825957" version="1" comment="389-ds-base-libs is &lt;1.3.8.4-25.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825958" version="1" comment="389-ds-base-snmp is &lt;1.3.8.4-25.1.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825959" version="1" comment="httpd is &lt;2.4.6-89.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825960" version="1" comment="httpd-devel is &lt;2.4.6-89.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825961" version="1" comment="httpd-manual is &lt;2.4.6-89.el7_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825962" version="1" comment="httpd-tools is &lt;2.4.6-89.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825963" version="1" comment="mod_ldap is &lt;2.4.6-89.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825964" version="1" comment="mod_proxy_html is &lt;2.4.6-89.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825965" version="1" comment="mod_session is &lt;2.4.6-89.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825966" version="1" comment="mod_ssl is &lt;2.4.6-89.el7_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825967" version="1" comment="icedtea-web is &lt;1.7.1-2.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825968" version="1" comment="icedtea-web-devel is &lt;1.7.1-2.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825969" version="1" comment="icedtea-web-javadoc is &lt;1.7.1-2.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825970" version="1" comment="zsh is &lt;5.0.2-33.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825971" version="1" comment="zsh-html is &lt;5.0.2-33.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825972" version="1" comment="evince is &lt;3.28.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825973" version="1" comment="evince-browser-plugin is &lt;3.28.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825974" version="1" comment="evince-devel is &lt;3.28.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825975" version="1" comment="evince-dvi is &lt;3.28.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825976" version="1" comment="evince-libs is &lt;3.28.2-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825977" version="1" comment="evince-nautilus is &lt;3.28.2-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825978" version="1" comment="okular is &lt;4.10.5-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825979" version="1" comment="okular-devel is &lt;4.10.5-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825980" version="1" comment="okular-libs is &lt;4.10.5-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825981" version="1" comment="okular-part is &lt;4.10.5-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825982" version="1" comment="poppler is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825983" version="1" comment="poppler-cpp is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825984" version="1" comment="poppler-cpp-devel is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825985" version="1" comment="poppler-demos is &lt;0.26.5-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825986" version="1" comment="poppler-devel is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825987" version="1" comment="poppler-glib is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825988" version="1" comment="poppler-glib-devel is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825989" version="1" comment="poppler-qt is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825990" version="1" comment="poppler-qt-devel is &lt;0.26.5-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825991" version="1" comment="poppler-utils is &lt;0.26.5-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825992" version="1" comment="ruby is &lt;2.0.0.648-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825993" version="1" comment="ruby-devel is &lt;2.0.0.648-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825994" version="1" comment="ruby-doc is &lt;2.0.0.648-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825995" version="1" comment="ruby-irb is &lt;2.0.0.648-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825996" version="1" comment="ruby-libs is &lt;2.0.0.648-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825997" version="1" comment="ruby-tcltk is &lt;2.0.0.648-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825998" version="1" comment="rubygem-bigdecimal is &lt;1.2.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009825999" version="1" comment="rubygem-io-console is &lt;0.4.2-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826000" version="1" comment="rubygem-json is &lt;1.7.7-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826001" version="1" comment="rubygem-minitest is &lt;4.3.2-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826002" version="1" comment="rubygem-psych is &lt;2.0.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826003" version="1" comment="rubygem-rake is &lt;0.9.6-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826004" version="1" comment="rubygem-rdoc is &lt;4.0.0-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826005" version="1" comment="rubygems is &lt;2.0.14.1-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826006" version="1" comment="rubygems-devel is &lt;2.0.14.1-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826007" version="1" comment="bpftool is &lt;3.10.0-1062.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826008" version="1" comment="kernel is &lt;3.10.0-1062.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826009" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826010" version="1" comment="kernel-debug is &lt;3.10.0-1062.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826013" version="1" comment="kernel-doc is &lt;3.10.0-1062.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826014" version="1" comment="kernel-headers is &lt;3.10.0-1062.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826015" version="1" comment="kernel-tools is &lt;3.10.0-1062.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826016" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826018" version="1" comment="perf is &lt;3.10.0-1062.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826019" version="1" comment="python-perf is &lt;3.10.0-1062.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826020" version="1" comment="python is &lt;2.7.5-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826021" version="1" comment="python-debug is &lt;2.7.5-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826022" version="1" comment="python-devel is &lt;2.7.5-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826023" version="1" comment="python-libs is &lt;2.7.5-86.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826024" version="1" comment="python-test is &lt;2.7.5-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826025" version="1" comment="python-tools is &lt;2.7.5-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826026" version="1" comment="tkinter is &lt;2.7.5-86.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826027" version="1" comment="patch is &lt;2.7.1-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826028" version="1" comment="python-requests is &lt;2.6.0-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826029" version="1" comment="fence-agents-aliyun is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826030" version="1" comment="fence-agents-all is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826031" version="1" comment="fence-agents-amt-ws is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826032" version="1" comment="fence-agents-apc is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826033" version="1" comment="fence-agents-apc-snmp is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826034" version="1" comment="fence-agents-aws is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826035" version="1" comment="fence-agents-azure-arm is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826036" version="1" comment="fence-agents-bladecenter is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826037" version="1" comment="fence-agents-brocade is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826038" version="1" comment="fence-agents-cisco-mds is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826039" version="1" comment="fence-agents-cisco-ucs is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826040" version="1" comment="fence-agents-common is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826041" version="1" comment="fence-agents-compute is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826042" version="1" comment="fence-agents-drac5 is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826043" version="1" comment="fence-agents-eaton-snmp is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826044" version="1" comment="fence-agents-emerson is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826045" version="1" comment="fence-agents-eps is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826046" version="1" comment="fence-agents-gce is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826047" version="1" comment="fence-agents-heuristics-ping is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826048" version="1" comment="fence-agents-hpblade is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826049" version="1" comment="fence-agents-ibmblade is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826050" version="1" comment="fence-agents-ifmib is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826051" version="1" comment="fence-agents-ilo-moonshot is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826052" version="1" comment="fence-agents-ilo-mp is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826053" version="1" comment="fence-agents-ilo-ssh is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826054" version="1" comment="fence-agents-ilo2 is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826055" version="1" comment="fence-agents-intelmodular is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826056" version="1" comment="fence-agents-ipdu is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826057" version="1" comment="fence-agents-ipmilan is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826058" version="1" comment="fence-agents-kdump is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826059" version="1" comment="fence-agents-mpath is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826060" version="1" comment="fence-agents-redfish is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826061" version="1" comment="fence-agents-rhevm is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826062" version="1" comment="fence-agents-rsa is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826063" version="1" comment="fence-agents-rsb is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826064" version="1" comment="fence-agents-sbd is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826065" version="1" comment="fence-agents-scsi is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826066" version="1" comment="fence-agents-virsh is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826067" version="1" comment="fence-agents-vmware-rest is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826068" version="1" comment="fence-agents-vmware-soap is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826069" version="1" comment="fence-agents-wti is &lt;4.2.1-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826070" version="1" comment="polkit is &lt;0.112-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826071" version="1" comment="polkit-devel is &lt;0.112-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826072" version="1" comment="polkit-docs is &lt;0.112-22.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826073" version="1" comment="libcgroup is &lt;0.41-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826074" version="1" comment="libcgroup-devel is &lt;0.41-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826075" version="1" comment="libcgroup-pam is &lt;0.41-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826076" version="1" comment="libcgroup-tools is &lt;0.41-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826077" version="1" comment="exempi is &lt;2.2.0-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826078" version="1" comment="exempi-devel is &lt;2.2.0-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826079" version="1" comment="libmspack is &lt;0.5-0.7.alpha.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826080" version="1" comment="libmspack-devel is &lt;0.5-0.7.alpha.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826081" version="1" comment="compat-libtiff3 is &lt;3.9.4-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826082" version="1" comment="libjpeg-turbo is &lt;1.2.90-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826083" version="1" comment="libjpeg-turbo-devel is &lt;1.2.90-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826084" version="1" comment="libjpeg-turbo-static is &lt;1.2.90-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826085" version="1" comment="libjpeg-turbo-utils is &lt;1.2.90-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826086" version="1" comment="turbojpeg is &lt;1.2.90-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826087" version="1" comment="turbojpeg-devel is &lt;1.2.90-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826088" version="1" comment="libtiff is &lt;4.0.3-32.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826089" version="1" comment="libtiff-devel is &lt;4.0.3-32.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826090" version="1" comment="libtiff-static is &lt;4.0.3-32.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826091" version="1" comment="libtiff-tools is &lt;4.0.3-32.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826092" version="1" comment="bind is &lt;9.11.4-9.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826093" version="1" comment="bind-chroot is &lt;9.11.4-9.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826094" version="1" comment="bind-devel is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826095" version="1" comment="bind-export-devel is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826096" version="1" comment="bind-export-libs is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826097" version="1" comment="bind-libs is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826098" version="1" comment="bind-libs-lite is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826099" version="1" comment="bind-license is &lt;9.11.4-9.P2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826100" version="1" comment="bind-lite-devel is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826101" version="1" comment="bind-pkcs11 is &lt;9.11.4-9.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826102" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826103" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-9.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826104" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-9.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826105" version="1" comment="bind-sdb is &lt;9.11.4-9.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826106" version="1" comment="bind-sdb-chroot is &lt;9.11.4-9.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826107" version="1" comment="bind-utils is &lt;9.11.4-9.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826108" version="1" comment="dhclient is &lt;4.2.5-77.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826109" version="1" comment="dhcp is &lt;4.2.5-77.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826110" version="1" comment="dhcp-common is &lt;4.2.5-77.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826111" version="1" comment="dhcp-devel is &lt;4.2.5-77.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826112" version="1" comment="dhcp-libs is &lt;4.2.5-77.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826113" version="1" comment="binutils is &lt;2.27-41.base.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826114" version="1" comment="binutils-devel is &lt;2.27-41.base.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826115" version="1" comment="ntp is &lt;4.2.6p5-29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826116" version="1" comment="ntp-doc is &lt;4.2.6p5-29.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826117" version="1" comment="ntp-perl is &lt;4.2.6p5-29.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826118" version="1" comment="ntpdate is &lt;4.2.6p5-29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826119" version="1" comment="sntp is &lt;4.2.6p5-29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826120" version="1" comment="qemu-img is &lt;1.5.3-167.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826121" version="1" comment="qemu-kvm is &lt;1.5.3-167.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826122" version="1" comment="qemu-kvm-common is &lt;1.5.3-167.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826123" version="1" comment="qemu-kvm-tools is &lt;1.5.3-167.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826124" version="1" comment="gdm is &lt;3.28.2-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826125" version="1" comment="gdm-devel is &lt;3.28.2-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826126" version="1" comment="gdm-pam-extensions-devel is &lt;3.28.2-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826127" version="1" comment="libX11 is &lt;1.6.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826128" version="1" comment="libX11-common is &lt;1.6.7-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826129" version="1" comment="libX11-devel is &lt;1.6.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826130" version="1" comment="libxkbcommon is &lt;0.7.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826131" version="1" comment="libxkbcommon-devel is &lt;0.7.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826132" version="1" comment="libxkbcommon-x11 is &lt;0.7.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826133" version="1" comment="libxkbcommon-x11-devel is &lt;0.7.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826134" version="1" comment="mesa-libGLw is &lt;8.0.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826135" version="1" comment="mesa-libGLw-devel is &lt;8.0.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826136" version="1" comment="xorg-x11-drv-ati is &lt;19.0.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826137" version="1" comment="xorg-x11-drv-vesa is &lt;2.4.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826138" version="1" comment="xorg-x11-drv-wacom is &lt;0.36.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826139" version="1" comment="xorg-x11-drv-wacom-devel is &lt;0.36.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826140" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826141" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826142" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826143" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826144" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826145" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826146" version="1" comment="xorg-x11-server-common is &lt;1.20.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826147" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826148" version="1" comment="xorg-x11-server-source is &lt;1.20.4-7.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826149" version="1" comment="libgudev1 is &lt;219-67.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826150" version="1" comment="libgudev1-devel is &lt;219-67.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826151" version="1" comment="systemd is &lt;219-67.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826152" version="1" comment="systemd-devel is &lt;219-67.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826153" version="1" comment="systemd-journal-gateway is &lt;219-67.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826154" version="1" comment="systemd-libs is &lt;219-67.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826155" version="1" comment="systemd-networkd is &lt;219-67.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826156" version="1" comment="systemd-python is &lt;219-67.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826157" version="1" comment="systemd-resolved is &lt;219-67.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826158" version="1" comment="systemd-sysv is &lt;219-67.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826159" version="1" comment="perl-Archive-Tar is &lt;1.92-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826160" version="1" comment="ctdb is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826161" version="1" comment="ctdb-tests is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826162" version="1" comment="libsmbclient is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826163" version="1" comment="libsmbclient-devel is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826164" version="1" comment="libwbclient is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826165" version="1" comment="libwbclient-devel is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826166" version="1" comment="samba is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826167" version="1" comment="samba-client is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826168" version="1" comment="samba-client-libs is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826169" version="1" comment="samba-common is &lt;4.9.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826170" version="1" comment="samba-common-libs is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826171" version="1" comment="samba-common-tools is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826172" version="1" comment="samba-dc is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826173" version="1" comment="samba-dc-libs is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826174" version="1" comment="samba-devel is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826175" version="1" comment="samba-krb5-printing is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826176" version="1" comment="samba-libs is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826177" version="1" comment="samba-pidl is &lt;4.9.1-6.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826178" version="1" comment="samba-python is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826179" version="1" comment="samba-python-test is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826180" version="1" comment="samba-test is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826181" version="1" comment="samba-test-libs is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826182" version="1" comment="samba-vfs-glusterfs is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826183" version="1" comment="samba-winbind is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826184" version="1" comment="samba-winbind-clients is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826185" version="1" comment="samba-winbind-krb5-locator is &lt;4.9.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826186" version="1" comment="samba-winbind-modules is &lt;4.9.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826187" version="1" comment="exiv2 is &lt;0.27.0-2.el7_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826188" version="1" comment="exiv2-devel is &lt;0.27.0-2.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826189" version="1" comment="exiv2-doc is &lt;0.27.0-2.el7_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826190" version="1" comment="exiv2-libs is &lt;0.27.0-2.el7_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826191" version="1" comment="rsyslog is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826192" version="1" comment="rsyslog-crypto is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826193" version="1" comment="rsyslog-doc is &lt;8.24.0-38.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826194" version="1" comment="rsyslog-elasticsearch is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826195" version="1" comment="rsyslog-gnutls is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826196" version="1" comment="rsyslog-gssapi is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826197" version="1" comment="rsyslog-kafka is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826198" version="1" comment="rsyslog-libdbi is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826199" version="1" comment="rsyslog-mmaudit is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826200" version="1" comment="rsyslog-mmjsonparse is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826201" version="1" comment="rsyslog-mmkubernetes is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826202" version="1" comment="rsyslog-mmnormalize is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826203" version="1" comment="rsyslog-mmsnmptrapd is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826204" version="1" comment="rsyslog-mysql is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826205" version="1" comment="rsyslog-pgsql is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826206" version="1" comment="rsyslog-relp is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826207" version="1" comment="rsyslog-snmp is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826208" version="1" comment="rsyslog-udpspoof is &lt;8.24.0-38.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826209" version="1" comment="mod_auth_openidc is &lt;1.8.8-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826210" version="1" comment="glibc is &lt;2.17-292.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826211" version="1" comment="glibc-common is &lt;2.17-292.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826212" version="1" comment="glibc-devel is &lt;2.17-292.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826213" version="1" comment="glibc-headers is &lt;2.17-292.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826214" version="1" comment="glibc-static is &lt;2.17-292.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826215" version="1" comment="glibc-utils is &lt;2.17-292.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826216" version="1" comment="nscd is &lt;2.17-292.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826217" version="1" comment="OVMF is &lt;20180508-6.gitee3198e672e2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826218" version="1" comment="libwpd is &lt;0.10.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826219" version="1" comment="libwpd-devel is &lt;0.10.0-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826220" version="1" comment="libwpd-doc is &lt;0.10.0-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826221" version="1" comment="libwpd-tools is &lt;0.10.0-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826222" version="1" comment="qt5-assistant is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826223" version="1" comment="qt5-designer is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826224" version="1" comment="qt5-doctools is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826225" version="1" comment="qt5-linguist is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826226" version="1" comment="qt5-qdbusviewer is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826227" version="1" comment="qt5-qt3d is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826228" version="1" comment="qt5-qt3d-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826229" version="1" comment="qt5-qt3d-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826230" version="1" comment="qt5-qt3d-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826231" version="1" comment="qt5-qtbase is &lt;5.9.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826232" version="1" comment="qt5-qtbase-common is &lt;5.9.7-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826233" version="1" comment="qt5-qtbase-devel is &lt;5.9.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826234" version="1" comment="qt5-qtbase-doc is &lt;5.9.7-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826235" version="1" comment="qt5-qtbase-examples is &lt;5.9.7-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826236" version="1" comment="qt5-qtbase-gui is &lt;5.9.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826237" version="1" comment="qt5-qtbase-mysql is &lt;5.9.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826238" version="1" comment="qt5-qtbase-odbc is &lt;5.9.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826239" version="1" comment="qt5-qtbase-postgresql is &lt;5.9.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826240" version="1" comment="qt5-qtbase-static is &lt;5.9.7-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826241" version="1" comment="qt5-qtcanvas3d is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826242" version="1" comment="qt5-qtcanvas3d-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826243" version="1" comment="qt5-qtcanvas3d-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826244" version="1" comment="qt5-qtconnectivity is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826245" version="1" comment="qt5-qtconnectivity-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826246" version="1" comment="qt5-qtconnectivity-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826247" version="1" comment="qt5-qtconnectivity-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826248" version="1" comment="qt5-qtdeclarative is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826249" version="1" comment="qt5-qtdeclarative-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826250" version="1" comment="qt5-qtdeclarative-doc is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826251" version="1" comment="qt5-qtdeclarative-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826252" version="1" comment="qt5-qtdeclarative-static is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826253" version="1" comment="qt5-qtdoc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826254" version="1" comment="qt5-qtgraphicaleffects is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826255" version="1" comment="qt5-qtgraphicaleffects-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826256" version="1" comment="qt5-qtimageformats is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826257" version="1" comment="qt5-qtimageformats-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826258" version="1" comment="qt5-qtlocation is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826259" version="1" comment="qt5-qtlocation-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826260" version="1" comment="qt5-qtlocation-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826261" version="1" comment="qt5-qtlocation-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826262" version="1" comment="qt5-qtmultimedia is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826263" version="1" comment="qt5-qtmultimedia-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826264" version="1" comment="qt5-qtmultimedia-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826265" version="1" comment="qt5-qtmultimedia-examples is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826266" version="1" comment="qt5-qtquickcontrols is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826267" version="1" comment="qt5-qtquickcontrols-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826268" version="1" comment="qt5-qtquickcontrols-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826269" version="1" comment="qt5-qtquickcontrols2 is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826270" version="1" comment="qt5-qtquickcontrols2-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826271" version="1" comment="qt5-qtquickcontrols2-doc is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826272" version="1" comment="qt5-qtquickcontrols2-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826273" version="1" comment="qt5-qtscript is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826274" version="1" comment="qt5-qtscript-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826275" version="1" comment="qt5-qtscript-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826276" version="1" comment="qt5-qtscript-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826277" version="1" comment="qt5-qtsensors is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826278" version="1" comment="qt5-qtsensors-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826279" version="1" comment="qt5-qtsensors-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826280" version="1" comment="qt5-qtsensors-examples is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826281" version="1" comment="qt5-qtserialbus is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826282" version="1" comment="qt5-qtserialbus-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826283" version="1" comment="qt5-qtserialbus-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826284" version="1" comment="qt5-qtserialbus-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826285" version="1" comment="qt5-qtserialport is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826286" version="1" comment="qt5-qtserialport-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826287" version="1" comment="qt5-qtserialport-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826288" version="1" comment="qt5-qtserialport-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826289" version="1" comment="qt5-qtsvg is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826290" version="1" comment="qt5-qtsvg-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826291" version="1" comment="qt5-qtsvg-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826292" version="1" comment="qt5-qtsvg-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826293" version="1" comment="qt5-qttools is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826294" version="1" comment="qt5-qttools-common is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826295" version="1" comment="qt5-qttools-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826296" version="1" comment="qt5-qttools-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826297" version="1" comment="qt5-qttools-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826298" version="1" comment="qt5-qttools-libs-designer is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826299" version="1" comment="qt5-qttools-libs-designercomponents is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826300" version="1" comment="qt5-qttools-libs-help is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826301" version="1" comment="qt5-qttools-static is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826302" version="1" comment="qt5-qttranslations is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826303" version="1" comment="qt5-qtwayland is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826304" version="1" comment="qt5-qtwayland-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826305" version="1" comment="qt5-qtwayland-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826306" version="1" comment="qt5-qtwayland-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826307" version="1" comment="qt5-qtwebchannel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826308" version="1" comment="qt5-qtwebchannel-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826309" version="1" comment="qt5-qtwebchannel-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826310" version="1" comment="qt5-qtwebchannel-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826311" version="1" comment="qt5-qtwebsockets is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826312" version="1" comment="qt5-qtwebsockets-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826313" version="1" comment="qt5-qtwebsockets-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826314" version="1" comment="qt5-qtwebsockets-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826315" version="1" comment="qt5-qtx11extras is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826316" version="1" comment="qt5-qtx11extras-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826317" version="1" comment="qt5-qtx11extras-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826318" version="1" comment="qt5-qtxmlpatterns is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826319" version="1" comment="qt5-qtxmlpatterns-devel is &lt;5.9.7-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826320" version="1" comment="qt5-qtxmlpatterns-doc is &lt;5.9.7-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826321" version="1" comment="qt5-qtxmlpatterns-examples is &lt;5.9.7-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826322" version="1" comment="qt5-rpm-macros is &lt;5.9.7-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826323" version="1" comment="libssh2 is &lt;1.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826324" version="1" comment="libssh2-devel is &lt;1.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826325" version="1" comment="libssh2-docs is &lt;1.8.0-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826326" version="1" comment="keycloak-httpd-client-install is &lt;0.8-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826327" version="1" comment="python2-keycloak-httpd-client-install is &lt;0.8-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826328" version="1" comment="kcm_colors is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826329" version="1" comment="kde-settings is &lt;19-23.9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826330" version="1" comment="kde-settings-ksplash is &lt;19-23.9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826331" version="1" comment="kde-settings-minimal is &lt;19-23.9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826332" version="1" comment="kde-settings-plasma is &lt;19-23.9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826333" version="1" comment="kde-settings-pulseaudio is &lt;19-23.9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826334" version="1" comment="kde-style-oxygen is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826335" version="1" comment="kde-workspace is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826336" version="1" comment="kde-workspace-devel is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826337" version="1" comment="kde-workspace-ksplash-themes is &lt;4.11.19-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826338" version="1" comment="kde-workspace-libs is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826339" version="1" comment="kdeclassic-cursor-theme is &lt;4.11.19-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826340" version="1" comment="kdelibs is &lt;4.14.8-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826341" version="1" comment="kdelibs-apidocs is &lt;4.14.8-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826342" version="1" comment="kdelibs-common is &lt;4.14.8-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826343" version="1" comment="kdelibs-devel is &lt;4.14.8-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826344" version="1" comment="kdelibs-ktexteditor is &lt;4.14.8-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826345" version="1" comment="kgreeter-plugins is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826346" version="1" comment="khotkeys is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826347" version="1" comment="khotkeys-libs is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826348" version="1" comment="kinfocenter is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826349" version="1" comment="kmag is &lt;4.10.5-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826350" version="1" comment="kmenuedit is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826351" version="1" comment="ksysguard is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826352" version="1" comment="ksysguard-libs is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826353" version="1" comment="ksysguardd is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826354" version="1" comment="kwin is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826355" version="1" comment="kwin-gles is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826356" version="1" comment="kwin-gles-libs is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826357" version="1" comment="kwin-libs is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826358" version="1" comment="libkworkspace is &lt;4.11.19-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826359" version="1" comment="oxygen-cursor-themes is &lt;4.11.19-13.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826360" version="1" comment="plasma-scriptengine-python is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826361" version="1" comment="plasma-scriptengine-ruby is &lt;4.11.19-13.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826362" version="1" comment="qt-settings is &lt;19-23.9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826363" version="1" comment="virtuoso-opensource is &lt;6.1.6-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826364" version="1" comment="virtuoso-opensource-utils is &lt;6.1.6-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826365" version="1" comment="openssh is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826366" version="1" comment="openssh-askpass is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826367" version="1" comment="openssh-cavs is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826368" version="1" comment="openssh-clients is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826369" version="1" comment="openssh-keycat is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826370" version="1" comment="openssh-ldap is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826371" version="1" comment="openssh-server is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826372" version="1" comment="openssh-server-sysvinit is &lt;7.4p1-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826373" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-2.21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826374" version="1" comment="gvfs is &lt;1.36.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826375" version="1" comment="gvfs-afc is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826376" version="1" comment="gvfs-afp is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826377" version="1" comment="gvfs-archive is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826378" version="1" comment="gvfs-client is &lt;1.36.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826379" version="1" comment="gvfs-devel is &lt;1.36.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826380" version="1" comment="gvfs-fuse is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826381" version="1" comment="gvfs-goa is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826382" version="1" comment="gvfs-gphoto2 is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826383" version="1" comment="gvfs-mtp is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826384" version="1" comment="gvfs-smb is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826385" version="1" comment="gvfs-tests is &lt;1.36.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826386" version="1" comment="opensc is &lt;0.19.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826387" version="1" comment="freerdp is &lt;2.0.0-1.rc4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826388" version="1" comment="freerdp-devel is &lt;2.0.0-1.rc4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826389" version="1" comment="freerdp-libs is &lt;2.0.0-1.rc4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826390" version="1" comment="libwinpr is &lt;2.0.0-1.rc4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826391" version="1" comment="libwinpr-devel is &lt;2.0.0-1.rc4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826392" version="1" comment="vinagre is &lt;3.22.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826393" version="1" comment="unzip is &lt;6.0-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826394" version="1" comment="blktrace is &lt;1.0.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826395" version="1" comment="iwl100-firmware is &lt;39.31.5.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826396" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826397" version="1" comment="iwl105-firmware is &lt;18.168.6.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826398" version="1" comment="iwl135-firmware is &lt;18.168.6.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826399" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826400" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826401" version="1" comment="iwl3160-firmware is &lt;22.0.7.0-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826402" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826403" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826404" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826405" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826406" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826407" version="1" comment="iwl6000g2a-firmware is &lt;17.168.5.3-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826408" version="1" comment="iwl6000g2b-firmware is &lt;17.168.5.2-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826409" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826410" version="1" comment="iwl7260-firmware is &lt;22.0.7.0-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826411" version="1" comment="iwl7265-firmware is &lt;22.0.7.0-72.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826412" version="1" comment="linux-firmware is &lt;20190429-72.gitddde598.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826413" version="1" comment="libipa_hbac is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826414" version="1" comment="libipa_hbac-devel is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826415" version="1" comment="libsss_autofs is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826416" version="1" comment="libsss_certmap is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826417" version="1" comment="libsss_certmap-devel is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826418" version="1" comment="libsss_idmap is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826419" version="1" comment="libsss_idmap-devel is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826420" version="1" comment="libsss_nss_idmap is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826421" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826422" version="1" comment="libsss_simpleifp is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826423" version="1" comment="libsss_simpleifp-devel is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826424" version="1" comment="libsss_sudo is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826425" version="1" comment="python-libipa_hbac is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826426" version="1" comment="python-libsss_nss_idmap is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826427" version="1" comment="python-sss is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826428" version="1" comment="python-sss-murmur is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826429" version="1" comment="python-sssdconfig is &lt;1.16.4-21.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826430" version="1" comment="sssd is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826431" version="1" comment="sssd-ad is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826432" version="1" comment="sssd-client is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826433" version="1" comment="sssd-common is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826434" version="1" comment="sssd-common-pac is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826435" version="1" comment="sssd-dbus is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826436" version="1" comment="sssd-ipa is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826437" version="1" comment="sssd-kcm is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826438" version="1" comment="sssd-krb5 is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826439" version="1" comment="sssd-krb5-common is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826440" version="1" comment="sssd-ldap is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826441" version="1" comment="sssd-libwbclient is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826442" version="1" comment="sssd-libwbclient-devel is &lt;1.16.4-21.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826443" version="1" comment="sssd-polkit-rules is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826444" version="1" comment="sssd-proxy is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826445" version="1" comment="sssd-tools is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826446" version="1" comment="sssd-winbind-idmap is &lt;1.16.4-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826447" version="1" comment="libudisks2 is &lt;2.7.3-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826448" version="1" comment="libudisks2-devel is &lt;2.7.3-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826449" version="1" comment="udisks2 is &lt;2.7.3-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826450" version="1" comment="udisks2-iscsi is &lt;2.7.3-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826451" version="1" comment="udisks2-lsm is &lt;2.7.3-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826452" version="1" comment="udisks2-lvm2 is &lt;2.7.3-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826453" version="1" comment="curl is &lt;7.29.0-54.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826454" version="1" comment="libcurl is &lt;7.29.0-54.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826455" version="1" comment="libcurl-devel is &lt;7.29.0-54.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826456" version="1" comment="procps-ng is &lt;3.3.10-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826457" version="1" comment="procps-ng-devel is &lt;3.3.10-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826458" version="1" comment="procps-ng-i18n is &lt;3.3.10-26.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826459" version="1" comment="zziplib is &lt;0.13.62-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826460" version="1" comment="zziplib-devel is &lt;0.13.62-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826461" version="1" comment="zziplib-utils is &lt;0.13.62-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826462" version="1" comment="elfutils is &lt;0.176-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826463" version="1" comment="elfutils-default-yama-scope is &lt;0.176-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826464" version="1" comment="elfutils-devel is &lt;0.176-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826465" version="1" comment="elfutils-devel-static is &lt;0.176-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826466" version="1" comment="elfutils-libelf is &lt;0.176-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826467" version="1" comment="elfutils-libelf-devel is &lt;0.176-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826468" version="1" comment="elfutils-libelf-devel-static is &lt;0.176-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826469" version="1" comment="elfutils-libs is &lt;0.176-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826470" version="1" comment="tomcat is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826471" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826472" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826473" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826474" version="1" comment="tomcat-javadoc is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826475" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826476" version="1" comment="tomcat-jsvc is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826477" version="1" comment="tomcat-lib is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826478" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826479" version="1" comment="tomcat-webapps is &lt;7.0.76-9.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826480" version="1" comment="libgovirt is &lt;0.3.4-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826481" version="1" comment="libgovirt-devel is &lt;0.3.4-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826482" version="1" comment="spice-glib is &lt;0.35-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826483" version="1" comment="spice-glib-devel is &lt;0.35-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826484" version="1" comment="spice-gtk-tools is &lt;0.35-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826485" version="1" comment="spice-gtk3 is &lt;0.35-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826486" version="1" comment="spice-gtk3-devel is &lt;0.35-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826487" version="1" comment="spice-gtk3-vala is &lt;0.35-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826488" version="1" comment="spice-vdagent is &lt;0.14.0-18.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826489" version="1" comment="virt-viewer is &lt;5.0-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826490" version="1" comment="nspr is &lt;4.21.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826491" version="1" comment="nspr-devel is &lt;4.21.0-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826492" version="1" comment="nss is &lt;3.44.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826493" version="1" comment="nss-devel is &lt;3.44.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826494" version="1" comment="nss-pkcs11-devel is &lt;3.44.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826495" version="1" comment="nss-softokn is &lt;3.44.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826496" version="1" comment="nss-softokn-devel is &lt;3.44.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826497" version="1" comment="nss-softokn-freebl is &lt;3.44.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826498" version="1" comment="nss-softokn-freebl-devel is &lt;3.44.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826499" version="1" comment="nss-sysinit is &lt;3.44.0-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826500" version="1" comment="nss-tools is &lt;3.44.0-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826501" version="1" comment="nss-util is &lt;3.44.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826502" version="1" comment="nss-util-devel is &lt;3.44.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826503" version="1" comment="http-parser is &lt;2.7.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826504" version="1" comment="http-parser-devel is &lt;2.7.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826505" version="1" comment="python-urllib3 is &lt;1.10.2-7.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826506" version="1" comment="emacs-mercurial is &lt;2.6.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826507" version="1" comment="emacs-mercurial-el is &lt;2.6.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826508" version="1" comment="mercurial is &lt;2.6.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826509" version="1" comment="mercurial-hgk is &lt;2.6.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826510" version="1" comment="uriparser is &lt;0.7.5-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826511" version="1" comment="uriparser-devel is &lt;0.7.5-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826512" version="1" comment="ghostscript is &lt;9.25-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826513" version="1" comment="ghostscript-cups is &lt;9.25-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826514" version="1" comment="ghostscript-doc is &lt;9.25-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826515" version="1" comment="ghostscript-gtk is &lt;9.25-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826516" version="1" comment="libgs is &lt;9.25-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826517" version="1" comment="libgs-devel is &lt;9.25-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826518" version="1" comment="sox is &lt;14.4.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826519" version="1" comment="sox-devel is &lt;14.4.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826520" version="1" comment="keepalived is &lt;1.3.5-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826521" version="1" comment="libsolv is &lt;0.6.34-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826522" version="1" comment="libsolv-demo is &lt;0.6.34-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826523" version="1" comment="libsolv-devel is &lt;0.6.34-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826524" version="1" comment="libsolv-tools is &lt;0.6.34-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826525" version="1" comment="python2-solv is &lt;0.6.34-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826526" version="1" comment="libvirt is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826527" version="1" comment="libvirt-admin is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826528" version="1" comment="libvirt-bash-completion is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826529" version="1" comment="libvirt-client is &lt;4.5.0-23.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826530" version="1" comment="libvirt-daemon is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826531" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826532" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826533" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826534" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826535" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826536" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826537" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826538" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826539" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826540" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826541" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826542" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826543" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826544" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826545" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826546" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826547" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826548" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826549" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826550" version="1" comment="libvirt-daemon-lxc is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826551" version="1" comment="libvirt-devel is &lt;4.5.0-23.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826552" version="1" comment="libvirt-docs is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826553" version="1" comment="libvirt-libs is &lt;4.5.0-23.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826554" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826555" version="1" comment="libvirt-login-shell is &lt;4.5.0-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826556" version="1" comment="libvirt-nss is &lt;4.5.0-23.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826557" version="1" comment="bsdcpio is &lt;3.1.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826558" version="1" comment="bsdtar is &lt;3.1.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826559" version="1" comment="libarchive is &lt;3.1.2-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826560" version="1" comment="libarchive-devel is &lt;3.1.2-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826561" version="1" comment="openssl is &lt;1.0.2k-19.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826562" version="1" comment="openssl-devel is &lt;1.0.2k-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826563" version="1" comment="openssl-libs is &lt;1.0.2k-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826564" version="1" comment="openssl-perl is &lt;1.0.2k-19.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826565" version="1" comment="openssl-static is &lt;1.0.2k-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826566" version="1" comment="libguestfs-winsupport is &lt;7.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826567" version="1" comment="mariadb is &lt;5.5.64-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826568" version="1" comment="mariadb-bench is &lt;5.5.64-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826569" version="1" comment="mariadb-devel is &lt;5.5.64-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826570" version="1" comment="mariadb-embedded is &lt;5.5.64-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826571" version="1" comment="mariadb-embedded-devel is &lt;5.5.64-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826572" version="1" comment="mariadb-libs is &lt;5.5.64-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826573" version="1" comment="mariadb-server is &lt;5.5.64-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826574" version="1" comment="mariadb-test is &lt;5.5.64-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826575" version="1" comment="advancecomp is &lt;1.15-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826576" version="1" comment="unixODBC is &lt;2.3.1-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826577" version="1" comment="unixODBC-devel is &lt;2.3.1-14.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826578" version="1" comment="httpd is &lt;2.4.6-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826579" version="1" comment="httpd-devel is &lt;2.4.6-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826580" version="1" comment="httpd-manual is &lt;2.4.6-90.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826581" version="1" comment="httpd-tools is &lt;2.4.6-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826582" version="1" comment="mod_ldap is &lt;2.4.6-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826583" version="1" comment="mod_proxy_html is &lt;2.4.6-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826584" version="1" comment="mod_session is &lt;2.4.6-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826585" version="1" comment="mod_ssl is &lt;2.4.6-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826586" version="1" comment="ghostscript is &lt;9.25-2.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826587" version="1" comment="ghostscript-cups is &lt;9.25-2.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826588" version="1" comment="ghostscript-doc is &lt;9.25-2.el7_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826589" version="1" comment="ghostscript-gtk is &lt;9.25-2.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826590" version="1" comment="libgs is &lt;9.25-2.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826591" version="1" comment="libgs-devel is &lt;9.25-2.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826592" version="1" comment="pango is &lt;1.42.4-4.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826593" version="1" comment="pango-devel is &lt;1.42.4-4.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826594" version="1" comment="pango-tests is &lt;1.42.4-4.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826595" version="1" comment="ghostscript is &lt;9.25-2.el7_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826596" version="1" comment="ghostscript-cups is &lt;9.25-2.el7_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826597" version="1" comment="ghostscript-doc is &lt;9.25-2.el7_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826598" version="1" comment="ghostscript-gtk is &lt;9.25-2.el7_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826599" version="1" comment="libgs is &lt;9.25-2.el7_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826600" version="1" comment="libgs-devel is &lt;9.25-2.el7_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826601" version="1" comment="bpftool is &lt;3.10.0-1062.1.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826602" version="1" comment="kernel is &lt;3.10.0-1062.1.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826603" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.1.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826604" version="1" comment="kernel-debug is &lt;3.10.0-1062.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826607" version="1" comment="kernel-doc is &lt;3.10.0-1062.1.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826608" version="1" comment="kernel-headers is &lt;3.10.0-1062.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826609" version="1" comment="kernel-tools is &lt;3.10.0-1062.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826610" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.1.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826612" version="1" comment="perf is &lt;3.10.0-1062.1.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826613" version="1" comment="python-perf is &lt;3.10.0-1062.1.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826614" version="1" comment="kde-settings is &lt;19-23.10.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826615" version="1" comment="kde-settings-ksplash is &lt;19-23.10.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826616" version="1" comment="kde-settings-minimal is &lt;19-23.10.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826617" version="1" comment="kde-settings-plasma is &lt;19-23.10.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826618" version="1" comment="kde-settings-pulseaudio is &lt;19-23.10.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826619" version="1" comment="kdelibs is &lt;4.14.8-11.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826620" version="1" comment="kdelibs-apidocs is &lt;4.14.8-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826621" version="1" comment="kdelibs-common is &lt;4.14.8-11.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826622" version="1" comment="kdelibs-devel is &lt;4.14.8-11.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826623" version="1" comment="kdelibs-ktexteditor is &lt;4.14.8-11.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826624" version="1" comment="qt-settings is &lt;19-23.10.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826625" version="1" comment="qemu-img is &lt;1.5.3-167.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826626" version="1" comment="qemu-kvm is &lt;1.5.3-167.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826627" version="1" comment="qemu-kvm-common is &lt;1.5.3-167.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826628" version="1" comment="qemu-kvm-tools is &lt;1.5.3-167.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826629" version="1" comment="firefox is &lt;60.9.0-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826630" version="1" comment="thunderbird is &lt;60.9.0-1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826631" version="1" comment="bpftool is &lt;3.10.0-1062.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826632" version="1" comment="kernel is &lt;3.10.0-1062.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826633" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.1.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826634" version="1" comment="kernel-debug is &lt;3.10.0-1062.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826637" version="1" comment="kernel-doc is &lt;3.10.0-1062.1.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826638" version="1" comment="kernel-headers is &lt;3.10.0-1062.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826639" version="1" comment="kernel-tools is &lt;3.10.0-1062.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826640" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.1.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826642" version="1" comment="perf is &lt;3.10.0-1062.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826643" version="1" comment="python-perf is &lt;3.10.0-1062.1.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826644" version="1" comment="dovecot is &lt;2.2.36-3.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826645" version="1" comment="dovecot-devel is &lt;2.2.36-3.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826646" version="1" comment="dovecot-mysql is &lt;2.2.36-3.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826647" version="1" comment="dovecot-pgsql is &lt;2.2.36-3.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826648" version="1" comment="dovecot-pigeonhole is &lt;2.2.36-3.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826649" version="1" comment="patch is &lt;2.7.1-12.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826650" version="1" comment="bpftool is &lt;3.10.0-1062.4.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826651" version="1" comment="kernel is &lt;3.10.0-1062.4.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826652" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.4.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826653" version="1" comment="kernel-debug is &lt;3.10.0-1062.4.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826656" version="1" comment="kernel-doc is &lt;3.10.0-1062.4.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826657" version="1" comment="kernel-headers is &lt;3.10.0-1062.4.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826658" version="1" comment="kernel-tools is &lt;3.10.0-1062.4.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826659" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.4.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826661" version="1" comment="perf is &lt;3.10.0-1062.4.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826662" version="1" comment="python-perf is &lt;3.10.0-1062.4.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826663" version="1" comment="jss is &lt;4.4.6-3.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826664" version="1" comment="jss-javadoc is &lt;4.4.6-3.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826665" version="1" comment="java-11-openjdk is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826666" version="1" comment="java-11-openjdk-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826667" version="1" comment="java-11-openjdk-demo is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826668" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826669" version="1" comment="java-11-openjdk-devel is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826670" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826671" version="1" comment="java-11-openjdk-headless is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826672" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826673" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826674" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826675" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826676" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826677" version="1" comment="java-11-openjdk-jmods is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826678" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826679" version="1" comment="java-11-openjdk-src is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826680" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.5.10-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826681" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826682" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826683" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826684" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826685" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826686" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826687" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826688" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826689" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826690" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826691" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.232.b09-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826692" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.232.b09-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826693" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.232.b09-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826694" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.232.b09-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826695" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826696" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.232.b09-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826697" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.241-2.6.20.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826698" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.241-2.6.20.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826699" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.241-2.6.20.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826700" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.241-2.6.20.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826701" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.241-2.6.20.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826702" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.241-2.6.20.0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826703" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.241-2.6.20.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826704" version="1" comment="firefox is &lt;68.2.0-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826705" version="1" comment="sudo is &lt;1.8.23-4.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826706" version="1" comment="sudo-devel is &lt;1.8.23-4.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826707" version="1" comment="thunderbird is &lt;68.2.0-1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826708" version="1" comment="php is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826709" version="1" comment="php-bcmath is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826710" version="1" comment="php-cli is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826711" version="1" comment="php-common is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826712" version="1" comment="php-dba is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826713" version="1" comment="php-devel is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826714" version="1" comment="php-embedded is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826715" version="1" comment="php-enchant is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826716" version="1" comment="php-fpm is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826717" version="1" comment="php-gd is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826718" version="1" comment="php-intl is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826719" version="1" comment="php-ldap is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826720" version="1" comment="php-mbstring is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826721" version="1" comment="php-mysql is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826722" version="1" comment="php-mysqlnd is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826723" version="1" comment="php-odbc is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826724" version="1" comment="php-pdo is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826725" version="1" comment="php-pgsql is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826726" version="1" comment="php-process is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826727" version="1" comment="php-pspell is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826728" version="1" comment="php-recode is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826729" version="1" comment="php-snmp is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826730" version="1" comment="php-soap is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826731" version="1" comment="php-xml is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826732" version="1" comment="php-xmlrpc is &lt;5.4.16-46.1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826733" version="1" comment="bpftool is &lt;3.10.0-1062.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826734" version="1" comment="kernel is &lt;3.10.0-1062.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826735" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.4.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826736" version="1" comment="kernel-debug is &lt;3.10.0-1062.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826739" version="1" comment="kernel-doc is &lt;3.10.0-1062.4.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826740" version="1" comment="kernel-headers is &lt;3.10.0-1062.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826741" version="1" comment="kernel-tools is &lt;3.10.0-1062.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826742" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.4.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826744" version="1" comment="perf is &lt;3.10.0-1062.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826745" version="1" comment="python-perf is &lt;3.10.0-1062.4.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826746" version="1" comment="bpftool is &lt;3.10.0-1062.4.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826747" version="1" comment="kernel is &lt;3.10.0-1062.4.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826748" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.4.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826749" version="1" comment="kernel-debug is &lt;3.10.0-1062.4.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826752" version="1" comment="kernel-doc is &lt;3.10.0-1062.4.3.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826753" version="1" comment="kernel-headers is &lt;3.10.0-1062.4.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826754" version="1" comment="kernel-tools is &lt;3.10.0-1062.4.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826755" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.4.3.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826757" version="1" comment="perf is &lt;3.10.0-1062.4.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826758" version="1" comment="python-perf is &lt;3.10.0-1062.4.3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826759" version="1" comment="ghostscript is &lt;9.25-2.el7_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826760" version="1" comment="ghostscript-cups is &lt;9.25-2.el7_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826761" version="1" comment="ghostscript-doc is &lt;9.25-2.el7_7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826762" version="1" comment="ghostscript-gtk is &lt;9.25-2.el7_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826763" version="1" comment="libgs is &lt;9.25-2.el7_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826764" version="1" comment="libgs-devel is &lt;9.25-2.el7_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826765" version="1" comment="SDL is &lt;1.2.15-14.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826766" version="1" comment="SDL-devel is &lt;1.2.15-14.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826767" version="1" comment="SDL-static is &lt;1.2.15-14.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826768" version="1" comment="tcpdump is &lt;4.9.2-4.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826769" version="1" comment="bpftool is &lt;3.10.0-1062.7.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826770" version="1" comment="kernel is &lt;3.10.0-1062.7.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826771" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.7.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826772" version="1" comment="kernel-debug is &lt;3.10.0-1062.7.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826775" version="1" comment="kernel-doc is &lt;3.10.0-1062.7.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826776" version="1" comment="kernel-headers is &lt;3.10.0-1062.7.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826777" version="1" comment="kernel-tools is &lt;3.10.0-1062.7.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826778" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.7.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826780" version="1" comment="perf is &lt;3.10.0-1062.7.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826781" version="1" comment="python-perf is &lt;3.10.0-1062.7.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826782" version="1" comment="389-ds-base is &lt;1.3.9.1-12.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826783" version="1" comment="389-ds-base-devel is &lt;1.3.9.1-12.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826784" version="1" comment="389-ds-base-libs is &lt;1.3.9.1-12.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826785" version="1" comment="389-ds-base-snmp is &lt;1.3.9.1-12.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826786" version="1" comment="SDL is &lt;1.2.15-15.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826787" version="1" comment="SDL-devel is &lt;1.2.15-15.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826788" version="1" comment="SDL-static is &lt;1.2.15-15.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826789" version="1" comment="firefox is &lt;68.3.0-1.el7_7 for i686" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826790" version="1" comment="thunderbird is &lt;68.3.0-1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826791" version="1" comment="nss is &lt;3.44.0-7.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826792" version="1" comment="nss-devel is &lt;3.44.0-7.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826793" version="1" comment="nss-softokn is &lt;3.44.0-8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826794" version="1" comment="nss-softokn-devel is &lt;3.44.0-8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826795" version="1" comment="nss-softokn-freebl is &lt;3.44.0-8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826796" version="1" comment="nss-softokn-freebl-devel is &lt;3.44.0-8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826797" version="1" comment="nss-sysinit is &lt;3.44.0-7.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826798" version="1" comment="nss-tools is &lt;3.44.0-7.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826799" version="1" comment="nss-util is &lt;3.44.0-4.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826800" version="1" comment="nss-util-devel is &lt;3.44.0-4.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826801" version="1" comment="openslp is &lt;2.0.0-8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826802" version="1" comment="openslp-devel is &lt;2.0.0-8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826803" version="1" comment="openslp-server is &lt;2.0.0-8.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826804" version="1" comment="fribidi is &lt;1.0.2-1.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826805" version="1" comment="fribidi-devel is &lt;1.0.2-1.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826806" version="1" comment="firefox is &lt;68.4.1-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826807" version="1" comment="thunderbird is &lt;68.4.1-2.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826808" version="1" comment="java-11-openjdk is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826809" version="1" comment="java-11-openjdk-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826810" version="1" comment="java-11-openjdk-demo is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826811" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826812" version="1" comment="java-11-openjdk-devel is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826813" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826814" version="1" comment="java-11-openjdk-headless is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826815" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826816" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826817" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826818" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826819" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826820" version="1" comment="java-11-openjdk-jmods is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826821" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826822" version="1" comment="java-11-openjdk-src is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826823" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.6.10-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826824" version="1" comment="emacs-git is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826825" version="1" comment="emacs-git-el is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826826" version="1" comment="git is &lt;1.8.3.1-21.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826827" version="1" comment="git-all is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826828" version="1" comment="git-bzr is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826829" version="1" comment="git-cvs is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826830" version="1" comment="git-daemon is &lt;1.8.3.1-21.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826831" version="1" comment="git-email is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826832" version="1" comment="git-gnome-keyring is &lt;1.8.3.1-21.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826833" version="1" comment="git-gui is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826834" version="1" comment="git-hg is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826835" version="1" comment="git-instaweb is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826836" version="1" comment="git-p4 is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826837" version="1" comment="git-svn is &lt;1.8.3.1-21.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826838" version="1" comment="gitk is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826839" version="1" comment="gitweb is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826840" version="1" comment="perl-Git is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826841" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-21.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826842" version="1" comment="apache-commons-beanutils is &lt;1.8.3-15.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826843" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.8.3-15.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826844" version="1" comment="python-reportlab is &lt;2.5-9.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826845" version="1" comment="python-reportlab-docs is &lt;2.5-9.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826846" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826847" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826848" version="1" comment="java-1.8.0-openjdk-accessibility-debug is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826849" version="1" comment="java-1.8.0-openjdk-debug is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826850" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826851" version="1" comment="java-1.8.0-openjdk-demo-debug is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826852" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826853" version="1" comment="java-1.8.0-openjdk-devel-debug is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826854" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826855" version="1" comment="java-1.8.0-openjdk-headless-debug is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826856" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.242.b08-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826857" version="1" comment="java-1.8.0-openjdk-javadoc-debug is &lt;1.8.0.242.b08-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826858" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.242.b08-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826859" version="1" comment="java-1.8.0-openjdk-javadoc-zip-debug is &lt;1.8.0.242.b08-0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826860" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826861" version="1" comment="java-1.8.0-openjdk-src-debug is &lt;1.8.0.242.b08-0.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826862" version="1" comment="bsdcpio is &lt;3.1.2-14.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826863" version="1" comment="bsdtar is &lt;3.1.2-14.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826864" version="1" comment="libarchive is &lt;3.1.2-14.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826865" version="1" comment="libarchive-devel is &lt;3.1.2-14.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826866" version="1" comment="lemon is &lt;3.7.17-8.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826867" version="1" comment="sqlite is &lt;3.7.17-8.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826868" version="1" comment="sqlite-devel is &lt;3.7.17-8.el7_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826869" version="1" comment="sqlite-doc is &lt;3.7.17-8.el7_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826870" version="1" comment="sqlite-tcl is &lt;3.7.17-8.el7_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826871" version="1" comment="openjpeg2 is &lt;2.3.1-2.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826872" version="1" comment="openjpeg2-devel is &lt;2.3.1-2.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826873" version="1" comment="openjpeg2-devel-docs is &lt;2.3.1-2.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826874" version="1" comment="openjpeg2-tools is &lt;2.3.1-2.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826875" version="1" comment="qemu-img is &lt;1.5.3-167.el7_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826876" version="1" comment="qemu-kvm is &lt;1.5.3-167.el7_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826877" version="1" comment="qemu-kvm-common is &lt;1.5.3-167.el7_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826878" version="1" comment="qemu-kvm-tools is &lt;1.5.3-167.el7_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826879" version="1" comment="bpftool is &lt;3.10.0-1062.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826880" version="1" comment="kernel is &lt;3.10.0-1062.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826881" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.12.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826882" version="1" comment="kernel-debug is &lt;3.10.0-1062.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826885" version="1" comment="kernel-doc is &lt;3.10.0-1062.12.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826886" version="1" comment="kernel-headers is &lt;3.10.0-1062.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826887" version="1" comment="kernel-tools is &lt;3.10.0-1062.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826888" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.12.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826890" version="1" comment="perf is &lt;3.10.0-1062.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826891" version="1" comment="python-perf is &lt;3.10.0-1062.12.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826892" version="1" comment="ipa-client is &lt;4.6.5-11.el7_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826893" version="1" comment="ipa-client-common is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826894" version="1" comment="ipa-common is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826895" version="1" comment="ipa-python-compat is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826896" version="1" comment="ipa-server is &lt;4.6.5-11.el7_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826897" version="1" comment="ipa-server-common is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826898" version="1" comment="ipa-server-dns is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826899" version="1" comment="ipa-server-trust-ad is &lt;4.6.5-11.el7_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826900" version="1" comment="python2-ipaclient is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826901" version="1" comment="python2-ipalib is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826902" version="1" comment="python2-ipaserver is &lt;4.6.5-11.el7_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826903" version="1" comment="firefox is &lt;68.5.0-2.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826904" version="1" comment="sudo is &lt;1.8.23-4.el7_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826905" version="1" comment="sudo-devel is &lt;1.8.23-4.el7_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826906" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.251-2.6.21.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826907" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.251-2.6.21.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826908" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.251-2.6.21.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826909" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.251-2.6.21.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826910" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.251-2.6.21.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826911" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.251-2.6.21.0.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826912" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.251-2.6.21.0.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826913" version="1" comment="openjpeg2 is &lt;2.3.1-3.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826914" version="1" comment="openjpeg2-devel is &lt;2.3.1-3.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826915" version="1" comment="openjpeg2-devel-docs is &lt;2.3.1-3.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826916" version="1" comment="openjpeg2-tools is &lt;2.3.1-3.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826917" version="1" comment="ksh is &lt;20120801-140.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826918" version="1" comment="thunderbird is &lt;68.5.0-1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826919" version="1" comment="python-pillow is &lt;2.0.0-20.gitd1c6db8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826920" version="1" comment="python-pillow-devel is &lt;2.0.0-20.gitd1c6db8.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826921" version="1" comment="python-pillow-doc is &lt;2.0.0-20.gitd1c6db8.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826922" version="1" comment="python-pillow-qt is &lt;2.0.0-20.gitd1c6db8.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826923" version="1" comment="python-pillow-sane is &lt;2.0.0-20.gitd1c6db8.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826924" version="1" comment="python-pillow-tk is &lt;2.0.0-20.gitd1c6db8.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826925" version="1" comment="ppp is &lt;2.4.5-34.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826926" version="1" comment="ppp-devel is &lt;2.4.5-34.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826927" version="1" comment="http-parser is &lt;2.7.1-8.el7_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826928" version="1" comment="http-parser-devel is &lt;2.7.1-8.el7_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826929" version="1" comment="xerces-c is &lt;3.1.1-10.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826930" version="1" comment="xerces-c-devel is &lt;3.1.1-10.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826931" version="1" comment="xerces-c-doc is &lt;3.1.1-10.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826932" version="1" comment="firefox is &lt;68.6.0-1.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826933" version="1" comment="bpftool is &lt;3.10.0-1062.18.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826934" version="1" comment="kernel is &lt;3.10.0-1062.18.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826935" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1062.18.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826936" version="1" comment="kernel-debug is &lt;3.10.0-1062.18.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826939" version="1" comment="kernel-doc is &lt;3.10.0-1062.18.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826940" version="1" comment="kernel-headers is &lt;3.10.0-1062.18.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826941" version="1" comment="kernel-tools is &lt;3.10.0-1062.18.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826942" version="1" comment="kernel-tools-libs is &lt;3.10.0-1062.18.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826944" version="1" comment="perf is &lt;3.10.0-1062.18.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826945" version="1" comment="python-perf is &lt;3.10.0-1062.18.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826946" version="1" comment="python3-pip is &lt;9.0.3-7.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826947" version="1" comment="python-virtualenv is &lt;15.1.0-4.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826948" version="1" comment="zsh is &lt;5.0.2-34.el7_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826949" version="1" comment="zsh-html is &lt;5.0.2-34.el7_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826950" version="1" comment="tomcat is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826951" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826952" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826953" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826954" version="1" comment="tomcat-javadoc is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826955" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826956" version="1" comment="tomcat-jsvc is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826957" version="1" comment="tomcat-lib is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826958" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826959" version="1" comment="tomcat-webapps is &lt;7.0.76-11.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826960" version="1" comment="icu is &lt;50.2-4.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826961" version="1" comment="libicu is &lt;50.2-4.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826962" version="1" comment="libicu-devel is &lt;50.2-4.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826963" version="1" comment="libicu-doc is &lt;50.2-4.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826964" version="1" comment="thunderbird is &lt;68.6.0-1.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826965" version="1" comment="libvncserver is &lt;0.9.9-14.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826966" version="1" comment="libvncserver-devel is &lt;0.9.9-14.el7_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826967" version="1" comment="bmc-snmp-proxy is &lt;1.8.18-9.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826968" version="1" comment="exchange-bmc-os-info is &lt;1.8.18-9.el7_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826969" version="1" comment="ipmitool is &lt;1.8.18-9.el7_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826970" version="1" comment="rsyslog is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826971" version="1" comment="rsyslog-crypto is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826972" version="1" comment="rsyslog-doc is &lt;8.24.0-52.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826973" version="1" comment="rsyslog-elasticsearch is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826974" version="1" comment="rsyslog-gnutls is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826975" version="1" comment="rsyslog-gssapi is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826976" version="1" comment="rsyslog-kafka is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826977" version="1" comment="rsyslog-libdbi is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826978" version="1" comment="rsyslog-mmaudit is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826979" version="1" comment="rsyslog-mmjsonparse is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826980" version="1" comment="rsyslog-mmkubernetes is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826981" version="1" comment="rsyslog-mmnormalize is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826982" version="1" comment="rsyslog-mmsnmptrapd is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826983" version="1" comment="rsyslog-mysql is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826984" version="1" comment="rsyslog-pgsql is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826985" version="1" comment="rsyslog-relp is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826986" version="1" comment="rsyslog-snmp is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826987" version="1" comment="rsyslog-udpspoof is &lt;8.24.0-52.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826988" version="1" comment="mod_auth_mellon is &lt;0.14.0-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826989" version="1" comment="mod_auth_mellon-diagnostics is &lt;0.14.0-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826990" version="1" comment="expat is &lt;2.1.0-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826991" version="1" comment="expat-devel is &lt;2.1.0-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826992" version="1" comment="expat-static is &lt;2.1.0-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826993" version="1" comment="bpftool is &lt;3.10.0-1127.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826994" version="1" comment="kernel is &lt;3.10.0-1127.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826995" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1127.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826996" version="1" comment="kernel-debug is &lt;3.10.0-1127.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009826999" version="1" comment="kernel-doc is &lt;3.10.0-1127.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827000" version="1" comment="kernel-headers is &lt;3.10.0-1127.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827001" version="1" comment="kernel-tools is &lt;3.10.0-1127.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827002" version="1" comment="kernel-tools-libs is &lt;3.10.0-1127.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827004" version="1" comment="perf is &lt;3.10.0-1127.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827005" version="1" comment="python-perf is &lt;3.10.0-1127.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827006" version="1" comment="curl is &lt;7.29.0-57.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827007" version="1" comment="libcurl is &lt;7.29.0-57.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827008" version="1" comment="libcurl-devel is &lt;7.29.0-57.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827009" version="1" comment="LibRaw is &lt;0.19.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827010" version="1" comment="LibRaw-devel is &lt;0.19.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827011" version="1" comment="LibRaw-static is &lt;0.19.4-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827012" version="1" comment="accountsservice is &lt;0.6.50-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827013" version="1" comment="accountsservice-devel is &lt;0.6.50-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827014" version="1" comment="accountsservice-libs is &lt;0.6.50-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827015" version="1" comment="colord is &lt;1.3.4-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827016" version="1" comment="colord-devel is &lt;1.3.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827017" version="1" comment="colord-devel-docs is &lt;1.3.4-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827018" version="1" comment="colord-extra-profiles is &lt;1.3.4-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827019" version="1" comment="colord-libs is &lt;1.3.4-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827020" version="1" comment="control-center is &lt;3.28.1-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827021" version="1" comment="control-center-filesystem is &lt;3.28.1-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827022" version="1" comment="gdm is &lt;3.28.2-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827023" version="1" comment="gdm-devel is &lt;3.28.2-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827024" version="1" comment="gdm-pam-extensions-devel is &lt;3.28.2-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827025" version="1" comment="gnome-classic-session is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827026" version="1" comment="gnome-online-accounts is &lt;3.28.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827027" version="1" comment="gnome-online-accounts-devel is &lt;3.28.2-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827028" version="1" comment="gnome-settings-daemon is &lt;3.28.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827029" version="1" comment="gnome-settings-daemon-devel is &lt;3.28.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827030" version="1" comment="gnome-shell is &lt;3.28.3-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827031" version="1" comment="gnome-shell-extension-alternate-tab is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827032" version="1" comment="gnome-shell-extension-apps-menu is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827033" version="1" comment="gnome-shell-extension-auto-move-windows is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827034" version="1" comment="gnome-shell-extension-common is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827035" version="1" comment="gnome-shell-extension-dash-to-dock is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827036" version="1" comment="gnome-shell-extension-disable-screenshield is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827037" version="1" comment="gnome-shell-extension-drive-menu is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827038" version="1" comment="gnome-shell-extension-extra-osk-keys is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827039" version="1" comment="gnome-shell-extension-horizontal-workspaces is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827040" version="1" comment="gnome-shell-extension-launch-new-instance is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827041" version="1" comment="gnome-shell-extension-native-window-placement is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827042" version="1" comment="gnome-shell-extension-no-hot-corner is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827043" version="1" comment="gnome-shell-extension-panel-favorites is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827044" version="1" comment="gnome-shell-extension-places-menu is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827045" version="1" comment="gnome-shell-extension-screenshot-window-sizer is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827046" version="1" comment="gnome-shell-extension-systemMonitor is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827047" version="1" comment="gnome-shell-extension-top-icons is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827048" version="1" comment="gnome-shell-extension-updates-dialog is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827049" version="1" comment="gnome-shell-extension-user-theme is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827050" version="1" comment="gnome-shell-extension-window-grouper is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827051" version="1" comment="gnome-shell-extension-window-list is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827052" version="1" comment="gnome-shell-extension-windowsNavigator is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827053" version="1" comment="gnome-shell-extension-workspace-indicator is &lt;3.28.1-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827054" version="1" comment="gnome-tweak-tool is &lt;3.28.1-7.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827055" version="1" comment="gsettings-desktop-schemas is &lt;3.28.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827056" version="1" comment="gsettings-desktop-schemas-devel is &lt;3.28.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827057" version="1" comment="gtk-update-icon-cache is &lt;3.22.30-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827058" version="1" comment="gtk3 is &lt;3.22.30-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827059" version="1" comment="gtk3-devel is &lt;3.22.30-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827060" version="1" comment="gtk3-devel-docs is &lt;3.22.30-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827061" version="1" comment="gtk3-immodule-xim is &lt;3.22.30-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827062" version="1" comment="gtk3-immodules is &lt;3.22.30-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827063" version="1" comment="gtk3-tests is &lt;3.22.30-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827064" version="1" comment="libcanberra is &lt;0.30-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827065" version="1" comment="libcanberra-devel is &lt;0.30-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827066" version="1" comment="libcanberra-gtk2 is &lt;0.30-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827067" version="1" comment="libcanberra-gtk3 is &lt;0.30-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827068" version="1" comment="libgweather is &lt;3.28.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827069" version="1" comment="libgweather-devel is &lt;3.28.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827070" version="1" comment="mutter is &lt;3.28.3-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827071" version="1" comment="mutter-devel is &lt;3.28.3-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827072" version="1" comment="nautilus is &lt;3.26.3.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827073" version="1" comment="nautilus-devel is &lt;3.26.3.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827074" version="1" comment="nautilus-extensions is &lt;3.26.3.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827075" version="1" comment="osinfo-db is &lt;20190805-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827076" version="1" comment="shared-mime-info is &lt;1.8-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827077" version="1" comment="tracker is &lt;1.10.5-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827078" version="1" comment="tracker-devel is &lt;1.10.5-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827079" version="1" comment="tracker-docs is &lt;1.10.5-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827080" version="1" comment="tracker-needle is &lt;1.10.5-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827081" version="1" comment="tracker-preferences is &lt;1.10.5-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827082" version="1" comment="xchat is &lt;2.8.8-25.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827083" version="1" comment="xchat-tcl is &lt;2.8.8-25.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827084" version="1" comment="file is &lt;5.11-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827085" version="1" comment="file-devel is &lt;5.11-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827086" version="1" comment="file-libs is &lt;5.11-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827087" version="1" comment="file-static is &lt;5.11-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827088" version="1" comment="python-magic is &lt;5.11-36.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827089" version="1" comment="doxygen is &lt;1.8.5-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827090" version="1" comment="doxygen-doxywizard is &lt;1.8.5-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827091" version="1" comment="doxygen-latex is &lt;1.8.5-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827092" version="1" comment="texlive is &lt;2012-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827093" version="1" comment="texlive-adjustbox is &lt;svn26555.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827094" version="1" comment="texlive-adjustbox-doc is &lt;svn26555.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827095" version="1" comment="texlive-ae is &lt;svn15878.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827096" version="1" comment="texlive-ae-doc is &lt;svn15878.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827097" version="1" comment="texlive-algorithms is &lt;svn15878.0.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827098" version="1" comment="texlive-algorithms-doc is &lt;svn15878.0.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827099" version="1" comment="texlive-amscls is &lt;svn29207.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827100" version="1" comment="texlive-amscls-doc is &lt;svn29207.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827101" version="1" comment="texlive-amsfonts is &lt;svn29208.3.04-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827102" version="1" comment="texlive-amsfonts-doc is &lt;svn29208.3.04-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827103" version="1" comment="texlive-amsmath is &lt;svn29327.2.14-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827104" version="1" comment="texlive-amsmath-doc is &lt;svn29327.2.14-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827105" version="1" comment="texlive-anysize is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827106" version="1" comment="texlive-anysize-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827107" version="1" comment="texlive-appendix is &lt;svn15878.1.2b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827108" version="1" comment="texlive-appendix-doc is &lt;svn15878.1.2b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827109" version="1" comment="texlive-arabxetex is &lt;svn17470.v1.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827110" version="1" comment="texlive-arabxetex-doc is &lt;svn17470.v1.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827111" version="1" comment="texlive-arphic is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827112" version="1" comment="texlive-arphic-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827113" version="1" comment="texlive-attachfile is &lt;svn21866.v1.5b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827114" version="1" comment="texlive-attachfile-doc is &lt;svn21866.v1.5b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827115" version="1" comment="texlive-avantgar is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827116" version="1" comment="texlive-babel is &lt;svn24756.3.8m-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827117" version="1" comment="texlive-babel-doc is &lt;svn24756.3.8m-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827118" version="1" comment="texlive-babelbib is &lt;svn25245.1.31-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827119" version="1" comment="texlive-babelbib-doc is &lt;svn25245.1.31-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827120" version="1" comment="texlive-base is &lt;2012-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827121" version="1" comment="texlive-beamer is &lt;svn29349.3.26-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827122" version="1" comment="texlive-beamer-doc is &lt;svn29349.3.26-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827123" version="1" comment="texlive-bera is &lt;svn20031.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827124" version="1" comment="texlive-bera-doc is &lt;svn20031.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827125" version="1" comment="texlive-beton is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827126" version="1" comment="texlive-beton-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827127" version="1" comment="texlive-bibtex is &lt;svn26689.0.99d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827128" version="1" comment="texlive-bibtex-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827129" version="1" comment="texlive-bibtex-doc is &lt;svn26689.0.99d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827130" version="1" comment="texlive-bibtopic is &lt;svn15878.1.1a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827131" version="1" comment="texlive-bibtopic-doc is &lt;svn15878.1.1a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827132" version="1" comment="texlive-bidi is &lt;svn29650.12.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827133" version="1" comment="texlive-bidi-doc is &lt;svn29650.12.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827134" version="1" comment="texlive-bigfoot is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827135" version="1" comment="texlive-bigfoot-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827136" version="1" comment="texlive-bookman is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827137" version="1" comment="texlive-booktabs is &lt;svn15878.1.61803-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827138" version="1" comment="texlive-booktabs-doc is &lt;svn15878.1.61803-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827139" version="1" comment="texlive-breakurl is &lt;svn15878.1.30-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827140" version="1" comment="texlive-breakurl-doc is &lt;svn15878.1.30-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827141" version="1" comment="texlive-caption is &lt;svn29026.3.3__2013_02_03_-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827142" version="1" comment="texlive-caption-doc is &lt;svn29026.3.3__2013_02_03_-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827143" version="1" comment="texlive-carlisle is &lt;svn18258.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827144" version="1" comment="texlive-carlisle-doc is &lt;svn18258.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827145" version="1" comment="texlive-changebar is &lt;svn29349.3.5c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827146" version="1" comment="texlive-changebar-doc is &lt;svn29349.3.5c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827147" version="1" comment="texlive-changepage is &lt;svn15878.1.0c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827148" version="1" comment="texlive-changepage-doc is &lt;svn15878.1.0c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827149" version="1" comment="texlive-charter is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827150" version="1" comment="texlive-charter-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827151" version="1" comment="texlive-chngcntr is &lt;svn17157.1.0a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827152" version="1" comment="texlive-chngcntr-doc is &lt;svn17157.1.0a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827153" version="1" comment="texlive-cite is &lt;svn19955.5.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827154" version="1" comment="texlive-cite-doc is &lt;svn19955.5.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827155" version="1" comment="texlive-cjk is &lt;svn26296.4.8.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827156" version="1" comment="texlive-cjk-doc is &lt;svn26296.4.8.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827157" version="1" comment="texlive-cm is &lt;svn29581.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827158" version="1" comment="texlive-cm-doc is &lt;svn29581.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827159" version="1" comment="texlive-cm-lgc is &lt;svn28250.0.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827160" version="1" comment="texlive-cm-lgc-doc is &lt;svn28250.0.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827161" version="1" comment="texlive-cm-super is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827162" version="1" comment="texlive-cm-super-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827163" version="1" comment="texlive-cmap is &lt;svn26568.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827164" version="1" comment="texlive-cmap-doc is &lt;svn26568.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827165" version="1" comment="texlive-cmextra is &lt;svn14075.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827166" version="1" comment="texlive-cns is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827167" version="1" comment="texlive-cns-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827168" version="1" comment="texlive-collectbox is &lt;svn26557.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827169" version="1" comment="texlive-collectbox-doc is &lt;svn26557.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827170" version="1" comment="texlive-collection-basic is &lt;svn26314.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827171" version="1" comment="texlive-collection-documentation-base is &lt;svn17091.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827172" version="1" comment="texlive-collection-fontsrecommended is &lt;svn28082.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827173" version="1" comment="texlive-collection-htmlxml is &lt;svn28251.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827174" version="1" comment="texlive-collection-latex is &lt;svn25030.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827175" version="1" comment="texlive-collection-latexrecommended is &lt;svn25795.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827176" version="1" comment="texlive-collection-xetex is &lt;svn29634.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827177" version="1" comment="texlive-colortbl is &lt;svn25394.v1.0a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827178" version="1" comment="texlive-colortbl-doc is &lt;svn25394.v1.0a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827179" version="1" comment="texlive-courier is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827180" version="1" comment="texlive-crop is &lt;svn15878.1.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827181" version="1" comment="texlive-crop-doc is &lt;svn15878.1.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827182" version="1" comment="texlive-csquotes is &lt;svn24393.5.1d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827183" version="1" comment="texlive-csquotes-doc is &lt;svn24393.5.1d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827184" version="1" comment="texlive-ctable is &lt;svn26694.1.23-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827185" version="1" comment="texlive-ctable-doc is &lt;svn26694.1.23-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827186" version="1" comment="texlive-currfile is &lt;svn29012.0.7b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827187" version="1" comment="texlive-currfile-doc is &lt;svn29012.0.7b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827188" version="1" comment="texlive-datetime is &lt;svn19834.2.58-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827189" version="1" comment="texlive-datetime-doc is &lt;svn19834.2.58-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827190" version="1" comment="texlive-dvipdfm is &lt;svn26689.0.13.2d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827191" version="1" comment="texlive-dvipdfm-bin is &lt;svn13663.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827192" version="1" comment="texlive-dvipdfm-doc is &lt;svn26689.0.13.2d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827193" version="1" comment="texlive-dvipdfmx is &lt;svn26765.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827194" version="1" comment="texlive-dvipdfmx-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827195" version="1" comment="texlive-dvipdfmx-def is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827196" version="1" comment="texlive-dvipdfmx-doc is &lt;svn26765.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827197" version="1" comment="texlive-dvipng is &lt;svn26689.1.14-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827198" version="1" comment="texlive-dvipng-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827199" version="1" comment="texlive-dvipng-doc is &lt;svn26689.1.14-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827200" version="1" comment="texlive-dvips is &lt;svn29585.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827201" version="1" comment="texlive-dvips-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827202" version="1" comment="texlive-dvips-doc is &lt;svn29585.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827203" version="1" comment="texlive-ec is &lt;svn25033.1.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827204" version="1" comment="texlive-ec-doc is &lt;svn25033.1.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827205" version="1" comment="texlive-eepic is &lt;svn15878.1.1e-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827206" version="1" comment="texlive-eepic-doc is &lt;svn15878.1.1e-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827207" version="1" comment="texlive-enctex is &lt;svn28602.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827208" version="1" comment="texlive-enctex-doc is &lt;svn28602.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827209" version="1" comment="texlive-enumitem is &lt;svn24146.3.5.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827210" version="1" comment="texlive-enumitem-doc is &lt;svn24146.3.5.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827211" version="1" comment="texlive-epsf is &lt;svn21461.2.7.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827212" version="1" comment="texlive-epsf-doc is &lt;svn21461.2.7.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827213" version="1" comment="texlive-epstopdf is &lt;svn26577.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827214" version="1" comment="texlive-epstopdf-bin is &lt;svn18336.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827215" version="1" comment="texlive-epstopdf-doc is &lt;svn26577.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827216" version="1" comment="texlive-eso-pic is &lt;svn21515.2.0c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827217" version="1" comment="texlive-eso-pic-doc is &lt;svn21515.2.0c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827218" version="1" comment="texlive-etex is &lt;svn22198.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827219" version="1" comment="texlive-etex-doc is &lt;svn22198.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827220" version="1" comment="texlive-etex-pkg is &lt;svn15878.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827221" version="1" comment="texlive-etex-pkg-doc is &lt;svn15878.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827222" version="1" comment="texlive-etoolbox is &lt;svn20922.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827223" version="1" comment="texlive-etoolbox-doc is &lt;svn20922.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827224" version="1" comment="texlive-euenc is &lt;svn19795.0.1h-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827225" version="1" comment="texlive-euenc-doc is &lt;svn19795.0.1h-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827226" version="1" comment="texlive-euler is &lt;svn17261.2.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827227" version="1" comment="texlive-euler-doc is &lt;svn17261.2.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827228" version="1" comment="texlive-euro is &lt;svn22191.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827229" version="1" comment="texlive-euro-doc is &lt;svn22191.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827230" version="1" comment="texlive-eurosym is &lt;svn17265.1.4_subrfix-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827231" version="1" comment="texlive-eurosym-doc is &lt;svn17265.1.4_subrfix-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827232" version="1" comment="texlive-extsizes is &lt;svn17263.1.4a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827233" version="1" comment="texlive-extsizes-doc is &lt;svn17263.1.4a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827234" version="1" comment="texlive-fancybox is &lt;svn18304.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827235" version="1" comment="texlive-fancybox-doc is &lt;svn18304.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827236" version="1" comment="texlive-fancyhdr is &lt;svn15878.3.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827237" version="1" comment="texlive-fancyhdr-doc is &lt;svn15878.3.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827238" version="1" comment="texlive-fancyref is &lt;svn15878.0.9c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827239" version="1" comment="texlive-fancyref-doc is &lt;svn15878.0.9c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827240" version="1" comment="texlive-fancyvrb is &lt;svn18492.2.8-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827241" version="1" comment="texlive-fancyvrb-doc is &lt;svn18492.2.8-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827242" version="1" comment="texlive-filecontents is &lt;svn24250.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827243" version="1" comment="texlive-filecontents-doc is &lt;svn24250.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827244" version="1" comment="texlive-filehook is &lt;svn24280.0.5d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827245" version="1" comment="texlive-filehook-doc is &lt;svn24280.0.5d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827246" version="1" comment="texlive-fix2col is &lt;svn17133.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827247" version="1" comment="texlive-fix2col-doc is &lt;svn17133.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827248" version="1" comment="texlive-fixlatvian is &lt;svn21631.1a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827249" version="1" comment="texlive-fixlatvian-doc is &lt;svn21631.1a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827250" version="1" comment="texlive-float is &lt;svn15878.1.3d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827251" version="1" comment="texlive-float-doc is &lt;svn15878.1.3d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827252" version="1" comment="texlive-fmtcount is &lt;svn28068.2.02-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827253" version="1" comment="texlive-fmtcount-doc is &lt;svn28068.2.02-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827254" version="1" comment="texlive-fncychap is &lt;svn20710.v1.34-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827255" version="1" comment="texlive-fncychap-doc is &lt;svn20710.v1.34-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827256" version="1" comment="texlive-fontbook is &lt;svn23608.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827257" version="1" comment="texlive-fontbook-doc is &lt;svn23608.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827258" version="1" comment="texlive-fontspec is &lt;svn29412.v2.3a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827259" version="1" comment="texlive-fontspec-doc is &lt;svn29412.v2.3a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827260" version="1" comment="texlive-fontware is &lt;svn26689.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827261" version="1" comment="texlive-fontware-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827262" version="1" comment="texlive-fontwrap is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827263" version="1" comment="texlive-fontwrap-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827264" version="1" comment="texlive-footmisc is &lt;svn23330.5.5b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827265" version="1" comment="texlive-footmisc-doc is &lt;svn23330.5.5b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827266" version="1" comment="texlive-fp is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827267" version="1" comment="texlive-fp-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827268" version="1" comment="texlive-fpl is &lt;svn15878.1.002-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827269" version="1" comment="texlive-fpl-doc is &lt;svn15878.1.002-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827270" version="1" comment="texlive-framed is &lt;svn26789.0.96-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827271" version="1" comment="texlive-framed-doc is &lt;svn26789.0.96-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827272" version="1" comment="texlive-garuda-c90 is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827273" version="1" comment="texlive-geometry is &lt;svn19716.5.6-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827274" version="1" comment="texlive-geometry-doc is &lt;svn19716.5.6-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827275" version="1" comment="texlive-glyphlist is &lt;svn28576.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827276" version="1" comment="texlive-graphics is &lt;svn25405.1.0o-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827277" version="1" comment="texlive-graphics-doc is &lt;svn25405.1.0o-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827278" version="1" comment="texlive-gsftopk is &lt;svn26689.1.19.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827279" version="1" comment="texlive-gsftopk-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827280" version="1" comment="texlive-helvetic is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827281" version="1" comment="texlive-hyperref is &lt;svn28213.6.83m-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827282" version="1" comment="texlive-hyperref-doc is &lt;svn28213.6.83m-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827283" version="1" comment="texlive-hyph-utf8 is &lt;svn29641.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827284" version="1" comment="texlive-hyph-utf8-doc is &lt;svn29641.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827285" version="1" comment="texlive-hyphen-base is &lt;svn29197.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827286" version="1" comment="texlive-hyphenat is &lt;svn15878.2.3c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827287" version="1" comment="texlive-hyphenat-doc is &lt;svn15878.2.3c-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827288" version="1" comment="texlive-ifetex is &lt;svn24853.1.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827289" version="1" comment="texlive-ifetex-doc is &lt;svn24853.1.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827290" version="1" comment="texlive-ifluatex is &lt;svn26725.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827291" version="1" comment="texlive-ifluatex-doc is &lt;svn26725.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827292" version="1" comment="texlive-ifmtarg is &lt;svn19363.1.2a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827293" version="1" comment="texlive-ifmtarg-doc is &lt;svn19363.1.2a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827294" version="1" comment="texlive-ifoddpage is &lt;svn23979.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827295" version="1" comment="texlive-ifoddpage-doc is &lt;svn23979.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827296" version="1" comment="texlive-iftex is &lt;svn29654.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827297" version="1" comment="texlive-iftex-doc is &lt;svn29654.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827298" version="1" comment="texlive-ifxetex is &lt;svn19685.0.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827299" version="1" comment="texlive-ifxetex-doc is &lt;svn19685.0.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827300" version="1" comment="texlive-index is &lt;svn24099.4.1beta-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827301" version="1" comment="texlive-index-doc is &lt;svn24099.4.1beta-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827302" version="1" comment="texlive-jadetex is &lt;svn23409.3.13-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827303" version="1" comment="texlive-jadetex-bin is &lt;svn3006.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827304" version="1" comment="texlive-jadetex-doc is &lt;svn23409.3.13-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827305" version="1" comment="texlive-jknapltx is &lt;svn19440.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827306" version="1" comment="texlive-jknapltx-doc is &lt;svn19440.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827307" version="1" comment="texlive-kastrup is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827308" version="1" comment="texlive-kastrup-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827309" version="1" comment="texlive-kerkis is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827310" version="1" comment="texlive-kerkis-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827311" version="1" comment="texlive-koma-script is &lt;svn27255.3.11b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827312" version="1" comment="texlive-kpathsea is &lt;svn28792.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827313" version="1" comment="texlive-kpathsea-bin is &lt;svn27347.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827314" version="1" comment="texlive-kpathsea-doc is &lt;svn28792.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827315" version="1" comment="texlive-kpathsea-lib is &lt;2012-45.20130427_r30134.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827316" version="1" comment="texlive-kpathsea-lib-devel is &lt;2012-45.20130427_r30134.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827317" version="1" comment="texlive-l3experimental is &lt;svn29361.SVN_4467-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827318" version="1" comment="texlive-l3experimental-doc is &lt;svn29361.SVN_4467-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827319" version="1" comment="texlive-l3kernel is &lt;svn29409.SVN_4469-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827320" version="1" comment="texlive-l3kernel-doc is &lt;svn29409.SVN_4469-45.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827321" version="1" comment="texlive-l3packages is &lt;svn29361.SVN_4467-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827322" version="1" comment="texlive-l3packages-doc is &lt;svn29361.SVN_4467-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827323" version="1" comment="texlive-lastpage is &lt;svn28985.1.2l-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827324" version="1" comment="texlive-lastpage-doc is &lt;svn28985.1.2l-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827325" version="1" comment="texlive-latex is &lt;svn27907.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827326" version="1" comment="texlive-latex-bin is &lt;svn26689.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827327" version="1" comment="texlive-latex-bin-bin is &lt;svn14050.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827328" version="1" comment="texlive-latex-doc is &lt;svn27907.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827329" version="1" comment="texlive-latex-fonts is &lt;svn28888.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827330" version="1" comment="texlive-latex-fonts-doc is &lt;svn28888.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827331" version="1" comment="texlive-latexconfig is &lt;svn28991.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827332" version="1" comment="texlive-lettrine is &lt;svn29391.1.64-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827333" version="1" comment="texlive-lettrine-doc is &lt;svn29391.1.64-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827334" version="1" comment="texlive-listings is &lt;svn15878.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827335" version="1" comment="texlive-listings-doc is &lt;svn15878.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827336" version="1" comment="texlive-lm is &lt;svn28119.2.004-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827337" version="1" comment="texlive-lm-doc is &lt;svn28119.2.004-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827338" version="1" comment="texlive-lm-math is &lt;svn29044.1.958-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827339" version="1" comment="texlive-lm-math-doc is &lt;svn29044.1.958-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827340" version="1" comment="texlive-ltxmisc is &lt;svn21927.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827341" version="1" comment="texlive-lua-alt-getopt is &lt;svn29349.0.7.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827342" version="1" comment="texlive-lua-alt-getopt-doc is &lt;svn29349.0.7.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827343" version="1" comment="texlive-lualatex-math is &lt;svn29346.1.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827344" version="1" comment="texlive-lualatex-math-doc is &lt;svn29346.1.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827345" version="1" comment="texlive-luaotfload is &lt;svn26718.1.26-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827346" version="1" comment="texlive-luaotfload-bin is &lt;svn18579.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827347" version="1" comment="texlive-luaotfload-doc is &lt;svn26718.1.26-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827348" version="1" comment="texlive-luatex is &lt;svn26689.0.70.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827349" version="1" comment="texlive-luatex-bin is &lt;svn26912.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827350" version="1" comment="texlive-luatex-doc is &lt;svn26689.0.70.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827351" version="1" comment="texlive-luatexbase is &lt;svn22560.0.31-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827352" version="1" comment="texlive-luatexbase-doc is &lt;svn22560.0.31-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827353" version="1" comment="texlive-makecmds is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827354" version="1" comment="texlive-makecmds-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827355" version="1" comment="texlive-makeindex is &lt;svn26689.2.12-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827356" version="1" comment="texlive-makeindex-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827357" version="1" comment="texlive-makeindex-doc is &lt;svn26689.2.12-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827358" version="1" comment="texlive-marginnote is &lt;svn25880.v1.1i-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827359" version="1" comment="texlive-marginnote-doc is &lt;svn25880.v1.1i-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827360" version="1" comment="texlive-marvosym is &lt;svn29349.2.2a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827361" version="1" comment="texlive-marvosym-doc is &lt;svn29349.2.2a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827362" version="1" comment="texlive-mathpazo is &lt;svn15878.1.003-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827363" version="1" comment="texlive-mathpazo-doc is &lt;svn15878.1.003-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827364" version="1" comment="texlive-mathspec is &lt;svn15878.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827365" version="1" comment="texlive-mathspec-doc is &lt;svn15878.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827366" version="1" comment="texlive-mdwtools is &lt;svn15878.1.05.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827367" version="1" comment="texlive-mdwtools-doc is &lt;svn15878.1.05.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827368" version="1" comment="texlive-memoir is &lt;svn21638.3.6j_patch_6.0g-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827369" version="1" comment="texlive-memoir-doc is &lt;svn21638.3.6j_patch_6.0g-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827370" version="1" comment="texlive-metafont is &lt;svn26689.2.718281-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827371" version="1" comment="texlive-metafont-bin is &lt;svn26912.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827372" version="1" comment="texlive-metalogo is &lt;svn18611.0.12-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827373" version="1" comment="texlive-metalogo-doc is &lt;svn18611.0.12-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827374" version="1" comment="texlive-metapost is &lt;svn26689.1.212-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827375" version="1" comment="texlive-metapost-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827376" version="1" comment="texlive-metapost-doc is &lt;svn26689.1.212-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827377" version="1" comment="texlive-metapost-examples-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827378" version="1" comment="texlive-mflogo is &lt;svn17487.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827379" version="1" comment="texlive-mflogo-doc is &lt;svn17487.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827380" version="1" comment="texlive-mfnfss is &lt;svn19410.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827381" version="1" comment="texlive-mfnfss-doc is &lt;svn19410.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827382" version="1" comment="texlive-mfware is &lt;svn26689.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827383" version="1" comment="texlive-mfware-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827384" version="1" comment="texlive-mh is &lt;svn29420.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827385" version="1" comment="texlive-mh-doc is &lt;svn29420.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827386" version="1" comment="texlive-microtype is &lt;svn29392.2.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827387" version="1" comment="texlive-microtype-doc is &lt;svn29392.2.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827388" version="1" comment="texlive-misc is &lt;svn24955.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827389" version="1" comment="texlive-mnsymbol is &lt;svn18651.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827390" version="1" comment="texlive-mnsymbol-doc is &lt;svn18651.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827391" version="1" comment="texlive-mparhack is &lt;svn15878.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827392" version="1" comment="texlive-mparhack-doc is &lt;svn15878.1.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827393" version="1" comment="texlive-mptopdf is &lt;svn26689.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827394" version="1" comment="texlive-mptopdf-bin is &lt;svn18674.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827395" version="1" comment="texlive-ms is &lt;svn24467.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827396" version="1" comment="texlive-ms-doc is &lt;svn24467.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827397" version="1" comment="texlive-multido is &lt;svn18302.1.42-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827398" version="1" comment="texlive-multido-doc is &lt;svn18302.1.42-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827399" version="1" comment="texlive-multirow is &lt;svn17256.1.6-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827400" version="1" comment="texlive-multirow-doc is &lt;svn17256.1.6-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827401" version="1" comment="texlive-natbib is &lt;svn20668.8.31b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827402" version="1" comment="texlive-natbib-doc is &lt;svn20668.8.31b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827403" version="1" comment="texlive-ncctools is &lt;svn15878.3.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827404" version="1" comment="texlive-ncctools-doc is &lt;svn15878.3.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827405" version="1" comment="texlive-ncntrsbk is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827406" version="1" comment="texlive-norasi-c90 is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827407" version="1" comment="texlive-ntgclass is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827408" version="1" comment="texlive-ntgclass-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827409" version="1" comment="texlive-oberdiek is &lt;svn26725.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827410" version="1" comment="texlive-oberdiek-doc is &lt;svn26725.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827411" version="1" comment="texlive-overpic is &lt;svn19712.0.53-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827412" version="1" comment="texlive-overpic-doc is &lt;svn19712.0.53-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827413" version="1" comment="texlive-palatino is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827414" version="1" comment="texlive-paralist is &lt;svn15878.2.3b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827415" version="1" comment="texlive-paralist-doc is &lt;svn15878.2.3b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827416" version="1" comment="texlive-parallel is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827417" version="1" comment="texlive-parallel-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827418" version="1" comment="texlive-parskip is &lt;svn19963.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827419" version="1" comment="texlive-parskip-doc is &lt;svn19963.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827420" version="1" comment="texlive-passivetex is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827421" version="1" comment="texlive-pdfpages is &lt;svn27574.0.4t-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827422" version="1" comment="texlive-pdfpages-doc is &lt;svn27574.0.4t-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827423" version="1" comment="texlive-pdftex is &lt;svn29585.1.40.11-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827424" version="1" comment="texlive-pdftex-bin is &lt;svn27321.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827425" version="1" comment="texlive-pdftex-def is &lt;svn22653.0.06d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827426" version="1" comment="texlive-pdftex-doc is &lt;svn29585.1.40.11-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827427" version="1" comment="texlive-pgf is &lt;svn22614.2.10-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827428" version="1" comment="texlive-pgf-doc is &lt;svn22614.2.10-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827429" version="1" comment="texlive-philokalia is &lt;svn18651.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827430" version="1" comment="texlive-philokalia-doc is &lt;svn18651.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827431" version="1" comment="texlive-placeins is &lt;svn19848.2.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827432" version="1" comment="texlive-placeins-doc is &lt;svn19848.2.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827433" version="1" comment="texlive-plain is &lt;svn26647.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827434" version="1" comment="texlive-polyglossia is &lt;svn26163.v1.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827435" version="1" comment="texlive-polyglossia-doc is &lt;svn26163.v1.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827436" version="1" comment="texlive-powerdot is &lt;svn25656.1.4i-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827437" version="1" comment="texlive-powerdot-doc is &lt;svn25656.1.4i-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827438" version="1" comment="texlive-preprint is &lt;svn16085.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827439" version="1" comment="texlive-preprint-doc is &lt;svn16085.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827440" version="1" comment="texlive-psfrag is &lt;svn15878.3.04-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827441" version="1" comment="texlive-psfrag-doc is &lt;svn15878.3.04-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827442" version="1" comment="texlive-pslatex is &lt;svn16416.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827443" version="1" comment="texlive-psnfss is &lt;svn23394.9.2a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827444" version="1" comment="texlive-psnfss-doc is &lt;svn23394.9.2a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827445" version="1" comment="texlive-pspicture is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827446" version="1" comment="texlive-pspicture-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827447" version="1" comment="texlive-pst-3d is &lt;svn17257.1.10-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827448" version="1" comment="texlive-pst-3d-doc is &lt;svn17257.1.10-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827449" version="1" comment="texlive-pst-blur is &lt;svn15878.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827450" version="1" comment="texlive-pst-blur-doc is &lt;svn15878.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827451" version="1" comment="texlive-pst-coil is &lt;svn24020.1.06-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827452" version="1" comment="texlive-pst-coil-doc is &lt;svn24020.1.06-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827453" version="1" comment="texlive-pst-eps is &lt;svn15878.1.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827454" version="1" comment="texlive-pst-eps-doc is &lt;svn15878.1.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827455" version="1" comment="texlive-pst-fill is &lt;svn15878.1.01-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827456" version="1" comment="texlive-pst-fill-doc is &lt;svn15878.1.01-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827457" version="1" comment="texlive-pst-grad is &lt;svn15878.1.06-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827458" version="1" comment="texlive-pst-grad-doc is &lt;svn15878.1.06-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827459" version="1" comment="texlive-pst-math is &lt;svn20176.0.61-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827460" version="1" comment="texlive-pst-math-doc is &lt;svn20176.0.61-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827461" version="1" comment="texlive-pst-node is &lt;svn27799.1.25-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827462" version="1" comment="texlive-pst-node-doc is &lt;svn27799.1.25-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827463" version="1" comment="texlive-pst-plot is &lt;svn28729.1.44-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827464" version="1" comment="texlive-pst-plot-doc is &lt;svn28729.1.44-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827465" version="1" comment="texlive-pst-slpe is &lt;svn24391.1.31-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827466" version="1" comment="texlive-pst-slpe-doc is &lt;svn24391.1.31-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827467" version="1" comment="texlive-pst-text is &lt;svn15878.1.00-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827468" version="1" comment="texlive-pst-text-doc is &lt;svn15878.1.00-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827469" version="1" comment="texlive-pst-tree is &lt;svn24142.1.12-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827470" version="1" comment="texlive-pst-tree-doc is &lt;svn24142.1.12-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827471" version="1" comment="texlive-pstricks is &lt;svn29678.2.39-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827472" version="1" comment="texlive-pstricks-add is &lt;svn28750.3.59-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827473" version="1" comment="texlive-pstricks-add-doc is &lt;svn28750.3.59-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827474" version="1" comment="texlive-pstricks-doc is &lt;svn29678.2.39-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827475" version="1" comment="texlive-ptext is &lt;svn28124.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827476" version="1" comment="texlive-ptext-doc is &lt;svn28124.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827477" version="1" comment="texlive-pxfonts is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827478" version="1" comment="texlive-pxfonts-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827479" version="1" comment="texlive-qstest is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827480" version="1" comment="texlive-qstest-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827481" version="1" comment="texlive-rcs is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827482" version="1" comment="texlive-rcs-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827483" version="1" comment="texlive-realscripts is &lt;svn29423.0.3b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827484" version="1" comment="texlive-realscripts-doc is &lt;svn29423.0.3b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827485" version="1" comment="texlive-rotating is &lt;svn16832.2.16b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827486" version="1" comment="texlive-rotating-doc is &lt;svn16832.2.16b-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827487" version="1" comment="texlive-rsfs is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827488" version="1" comment="texlive-rsfs-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827489" version="1" comment="texlive-sansmath is &lt;svn17997.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827490" version="1" comment="texlive-sansmath-doc is &lt;svn17997.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827491" version="1" comment="texlive-sauerj is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827492" version="1" comment="texlive-sauerj-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827493" version="1" comment="texlive-scheme-basic is &lt;svn25923.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827494" version="1" comment="texlive-section is &lt;svn20180.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827495" version="1" comment="texlive-section-doc is &lt;svn20180.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827496" version="1" comment="texlive-sectsty is &lt;svn15878.2.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827497" version="1" comment="texlive-sectsty-doc is &lt;svn15878.2.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827498" version="1" comment="texlive-seminar is &lt;svn18322.1.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827499" version="1" comment="texlive-seminar-doc is &lt;svn18322.1.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827500" version="1" comment="texlive-sepnum is &lt;svn20186.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827501" version="1" comment="texlive-sepnum-doc is &lt;svn20186.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827502" version="1" comment="texlive-setspace is &lt;svn24881.6.7a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827503" version="1" comment="texlive-setspace-doc is &lt;svn24881.6.7a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827504" version="1" comment="texlive-showexpl is &lt;svn27790.v0.3j-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827505" version="1" comment="texlive-showexpl-doc is &lt;svn27790.v0.3j-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827506" version="1" comment="texlive-soul is &lt;svn15878.2.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827507" version="1" comment="texlive-soul-doc is &lt;svn15878.2.4-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827508" version="1" comment="texlive-stmaryrd is &lt;svn22027.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827509" version="1" comment="texlive-stmaryrd-doc is &lt;svn22027.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827510" version="1" comment="texlive-subfig is &lt;svn15878.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827511" version="1" comment="texlive-subfig-doc is &lt;svn15878.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827512" version="1" comment="texlive-subfigure is &lt;svn15878.2.1.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827513" version="1" comment="texlive-subfigure-doc is &lt;svn15878.2.1.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827514" version="1" comment="texlive-svn-prov is &lt;svn18017.3.1862-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827515" version="1" comment="texlive-svn-prov-doc is &lt;svn18017.3.1862-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827516" version="1" comment="texlive-symbol is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827517" version="1" comment="texlive-t2 is &lt;svn29349.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827518" version="1" comment="texlive-t2-doc is &lt;svn29349.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827519" version="1" comment="texlive-tetex is &lt;svn29585.3.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827520" version="1" comment="texlive-tetex-bin is &lt;svn27344.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827521" version="1" comment="texlive-tetex-doc is &lt;svn29585.3.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827522" version="1" comment="texlive-tex is &lt;svn26689.3.1415926-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827523" version="1" comment="texlive-tex-bin is &lt;svn26912.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827524" version="1" comment="texlive-tex-gyre is &lt;svn18651.2.004-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827525" version="1" comment="texlive-tex-gyre-doc is &lt;svn18651.2.004-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827526" version="1" comment="texlive-tex-gyre-math is &lt;svn29045.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827527" version="1" comment="texlive-tex-gyre-math-doc is &lt;svn29045.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827528" version="1" comment="texlive-tex4ht is &lt;svn29474.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827529" version="1" comment="texlive-tex4ht-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827530" version="1" comment="texlive-tex4ht-doc is &lt;svn29474.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827531" version="1" comment="texlive-texconfig is &lt;svn29349.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827532" version="1" comment="texlive-texconfig-bin is &lt;svn27344.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827533" version="1" comment="texlive-texlive.infra is &lt;svn28217.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827534" version="1" comment="texlive-texlive.infra-bin is &lt;svn22566.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827535" version="1" comment="texlive-texlive.infra-doc is &lt;svn28217.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827536" version="1" comment="texlive-textcase is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827537" version="1" comment="texlive-textcase-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827538" version="1" comment="texlive-textpos is &lt;svn28261.1.7h-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827539" version="1" comment="texlive-textpos-doc is &lt;svn28261.1.7h-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827540" version="1" comment="texlive-thailatex is &lt;svn29349.0.5.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827541" version="1" comment="texlive-thailatex-doc is &lt;svn29349.0.5.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827542" version="1" comment="texlive-threeparttable is &lt;svn17383.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827543" version="1" comment="texlive-threeparttable-doc is &lt;svn17383.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827544" version="1" comment="texlive-thumbpdf is &lt;svn26689.3.15-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827545" version="1" comment="texlive-thumbpdf-bin is &lt;svn6898.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827546" version="1" comment="texlive-thumbpdf-doc is &lt;svn26689.3.15-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827547" version="1" comment="texlive-times is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827548" version="1" comment="texlive-tipa is &lt;svn29349.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827549" version="1" comment="texlive-tipa-doc is &lt;svn29349.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827550" version="1" comment="texlive-titlesec is &lt;svn24852.2.10.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827551" version="1" comment="texlive-titlesec-doc is &lt;svn24852.2.10.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827552" version="1" comment="texlive-titling is &lt;svn15878.2.1d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827553" version="1" comment="texlive-titling-doc is &lt;svn15878.2.1d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827554" version="1" comment="texlive-tocloft is &lt;svn20084.2.3e-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827555" version="1" comment="texlive-tocloft-doc is &lt;svn20084.2.3e-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827556" version="1" comment="texlive-tools is &lt;svn26263.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827557" version="1" comment="texlive-tools-doc is &lt;svn26263.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827558" version="1" comment="texlive-txfonts is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827559" version="1" comment="texlive-txfonts-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827560" version="1" comment="texlive-type1cm is &lt;svn21820.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827561" version="1" comment="texlive-type1cm-doc is &lt;svn21820.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827562" version="1" comment="texlive-typehtml is &lt;svn17134.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827563" version="1" comment="texlive-typehtml-doc is &lt;svn17134.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827564" version="1" comment="texlive-ucharclasses is &lt;svn27820.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827565" version="1" comment="texlive-ucharclasses-doc is &lt;svn27820.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827566" version="1" comment="texlive-ucs is &lt;svn27549.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827567" version="1" comment="texlive-ucs-doc is &lt;svn27549.2.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827568" version="1" comment="texlive-uhc is &lt;svn16791.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827569" version="1" comment="texlive-uhc-doc is &lt;svn16791.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827570" version="1" comment="texlive-ulem is &lt;svn26785.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827571" version="1" comment="texlive-ulem-doc is &lt;svn26785.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827572" version="1" comment="texlive-underscore is &lt;svn18261.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827573" version="1" comment="texlive-underscore-doc is &lt;svn18261.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827574" version="1" comment="texlive-unicode-math is &lt;svn29413.0.7d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827575" version="1" comment="texlive-unicode-math-doc is &lt;svn29413.0.7d-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827576" version="1" comment="texlive-unisugar is &lt;svn22357.0.92-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827577" version="1" comment="texlive-unisugar-doc is &lt;svn22357.0.92-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827578" version="1" comment="texlive-url is &lt;svn16864.3.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827579" version="1" comment="texlive-url-doc is &lt;svn16864.3.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827580" version="1" comment="texlive-utopia is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827581" version="1" comment="texlive-utopia-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827582" version="1" comment="texlive-varwidth is &lt;svn24104.0.92-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827583" version="1" comment="texlive-varwidth-doc is &lt;svn24104.0.92-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827584" version="1" comment="texlive-wadalab is &lt;svn22576.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827585" version="1" comment="texlive-wadalab-doc is &lt;svn22576.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827586" version="1" comment="texlive-was is &lt;svn21439.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827587" version="1" comment="texlive-was-doc is &lt;svn21439.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827588" version="1" comment="texlive-wasy is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827589" version="1" comment="texlive-wasy-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827590" version="1" comment="texlive-wasysym is &lt;svn15878.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827591" version="1" comment="texlive-wasysym-doc is &lt;svn15878.2.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827592" version="1" comment="texlive-wrapfig is &lt;svn22048.3.6-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827593" version="1" comment="texlive-wrapfig-doc is &lt;svn22048.3.6-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827594" version="1" comment="texlive-xcolor is &lt;svn15878.2.11-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827595" version="1" comment="texlive-xcolor-doc is &lt;svn15878.2.11-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827596" version="1" comment="texlive-xdvi is &lt;svn26689.22.85-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827597" version="1" comment="texlive-xdvi-bin is &lt;svn26509.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827598" version="1" comment="texlive-xecjk is &lt;svn28816.3.1.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827599" version="1" comment="texlive-xecjk-doc is &lt;svn28816.3.1.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827600" version="1" comment="texlive-xecolor is &lt;svn29660.0.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827601" version="1" comment="texlive-xecolor-doc is &lt;svn29660.0.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827602" version="1" comment="texlive-xecyr is &lt;svn20221.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827603" version="1" comment="texlive-xecyr-doc is &lt;svn20221.1.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827604" version="1" comment="texlive-xeindex is &lt;svn16760.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827605" version="1" comment="texlive-xeindex-doc is &lt;svn16760.0.2-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827606" version="1" comment="texlive-xepersian is &lt;svn29661.12.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827607" version="1" comment="texlive-xepersian-doc is &lt;svn29661.12.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827608" version="1" comment="texlive-xesearch is &lt;svn16041.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827609" version="1" comment="texlive-xesearch-doc is &lt;svn16041.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827610" version="1" comment="texlive-xetex is &lt;svn26330.0.9997.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827611" version="1" comment="texlive-xetex-bin is &lt;svn26912.0-45.20130427_r30134.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827612" version="1" comment="texlive-xetex-def is &lt;svn29154.0.95-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827613" version="1" comment="texlive-xetex-doc is &lt;svn26330.0.9997.5-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827614" version="1" comment="texlive-xetex-itrans is &lt;svn24105.4.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827615" version="1" comment="texlive-xetex-itrans-doc is &lt;svn24105.4.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827616" version="1" comment="texlive-xetex-pstricks is &lt;svn17055.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827617" version="1" comment="texlive-xetex-pstricks-doc is &lt;svn17055.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827618" version="1" comment="texlive-xetex-tibetan is &lt;svn28847.0.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827619" version="1" comment="texlive-xetex-tibetan-doc is &lt;svn28847.0.1-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827620" version="1" comment="texlive-xetexconfig is &lt;svn28819.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827621" version="1" comment="texlive-xetexfontinfo is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827622" version="1" comment="texlive-xetexfontinfo-doc is &lt;svn15878.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827623" version="1" comment="texlive-xifthen is &lt;svn15878.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827624" version="1" comment="texlive-xifthen-doc is &lt;svn15878.1.3-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827625" version="1" comment="texlive-xkeyval is &lt;svn27995.2.6a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827626" version="1" comment="texlive-xkeyval-doc is &lt;svn27995.2.6a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827627" version="1" comment="texlive-xltxtra is &lt;svn19809.0.5e-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827628" version="1" comment="texlive-xltxtra-doc is &lt;svn19809.0.5e-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827629" version="1" comment="texlive-xmltex is &lt;svn28273.0.8-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827630" version="1" comment="texlive-xmltex-bin is &lt;svn3006.0-45.20130427_r30134.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827631" version="1" comment="texlive-xmltex-doc is &lt;svn28273.0.8-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827632" version="1" comment="texlive-xstring is &lt;svn29258.1.7a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827633" version="1" comment="texlive-xstring-doc is &lt;svn29258.1.7a-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827634" version="1" comment="texlive-xtab is &lt;svn23347.2.3f-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827635" version="1" comment="texlive-xtab-doc is &lt;svn23347.2.3f-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827636" version="1" comment="texlive-xunicode is &lt;svn23897.0.981-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827637" version="1" comment="texlive-xunicode-doc is &lt;svn23897.0.981-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827638" version="1" comment="texlive-zapfchan is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827639" version="1" comment="texlive-zapfding is &lt;svn28614.0-45.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827640" version="1" comment="advancecomp is &lt;1.15-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827641" version="1" comment="lftp is &lt;4.4.8-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827642" version="1" comment="lftp-scripts is &lt;4.4.8-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827643" version="1" comment="wireshark is &lt;1.10.14-24.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827644" version="1" comment="wireshark-devel is &lt;1.10.14-24.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827645" version="1" comment="wireshark-gnome is &lt;1.10.14-24.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827646" version="1" comment="cups is &lt;1.6.3-43.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827647" version="1" comment="cups-client is &lt;1.6.3-43.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827648" version="1" comment="cups-devel is &lt;1.6.3-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827649" version="1" comment="cups-filesystem is &lt;1.6.3-43.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827650" version="1" comment="cups-ipptool is &lt;1.6.3-43.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827651" version="1" comment="cups-libs is &lt;1.6.3-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827652" version="1" comment="cups-lpd is &lt;1.6.3-43.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827653" version="1" comment="libosinfo is &lt;1.1.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827654" version="1" comment="libosinfo-devel is &lt;1.1.0-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827655" version="1" comment="libosinfo-vala is &lt;1.1.0-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827656" version="1" comment="mailman is &lt;2.1.15-30.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827657" version="1" comment="bind is &lt;9.11.4-16.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827658" version="1" comment="bind-chroot is &lt;9.11.4-16.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827659" version="1" comment="bind-devel is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827660" version="1" comment="bind-export-devel is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827661" version="1" comment="bind-export-libs is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827662" version="1" comment="bind-libs is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827663" version="1" comment="bind-libs-lite is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827664" version="1" comment="bind-license is &lt;9.11.4-16.P2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827665" version="1" comment="bind-lite-devel is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827666" version="1" comment="bind-pkcs11 is &lt;9.11.4-16.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827667" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827668" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-16.P2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827669" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-16.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827670" version="1" comment="bind-sdb is &lt;9.11.4-16.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827671" version="1" comment="bind-sdb-chroot is &lt;9.11.4-16.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827672" version="1" comment="bind-utils is &lt;9.11.4-16.P2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827673" version="1" comment="dovecot is &lt;2.2.36-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827674" version="1" comment="dovecot-devel is &lt;2.2.36-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827675" version="1" comment="dovecot-mysql is &lt;2.2.36-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827676" version="1" comment="dovecot-pgsql is &lt;2.2.36-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827677" version="1" comment="dovecot-pigeonhole is &lt;2.2.36-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827678" version="1" comment="squid is &lt;3.5.20-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827679" version="1" comment="squid-migration-script is &lt;3.5.20-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827680" version="1" comment="squid-sysvinit is &lt;3.5.20-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827681" version="1" comment="evince is &lt;3.28.2-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827682" version="1" comment="evince-browser-plugin is &lt;3.28.2-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827683" version="1" comment="evince-devel is &lt;3.28.2-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827684" version="1" comment="evince-dvi is &lt;3.28.2-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827685" version="1" comment="evince-libs is &lt;3.28.2-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827686" version="1" comment="evince-nautilus is &lt;3.28.2-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827687" version="1" comment="poppler is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827688" version="1" comment="poppler-cpp is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827689" version="1" comment="poppler-cpp-devel is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827690" version="1" comment="poppler-demos is &lt;0.26.5-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827691" version="1" comment="poppler-devel is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827692" version="1" comment="poppler-glib is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827693" version="1" comment="poppler-glib-devel is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827694" version="1" comment="poppler-qt is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827695" version="1" comment="poppler-qt-devel is &lt;0.26.5-42.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827696" version="1" comment="poppler-utils is &lt;0.26.5-42.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827697" version="1" comment="atk is &lt;2.28.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827698" version="1" comment="atk-devel is &lt;2.28.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827699" version="1" comment="evolution is &lt;3.28.5-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827700" version="1" comment="evolution-bogofilter is &lt;3.28.5-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827701" version="1" comment="evolution-data-server is &lt;3.28.5-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827702" version="1" comment="evolution-data-server-devel is &lt;3.28.5-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827703" version="1" comment="evolution-data-server-doc is &lt;3.28.5-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827704" version="1" comment="evolution-data-server-langpacks is &lt;3.28.5-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827705" version="1" comment="evolution-data-server-perl is &lt;3.28.5-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827706" version="1" comment="evolution-data-server-tests is &lt;3.28.5-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827707" version="1" comment="evolution-devel is &lt;3.28.5-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827708" version="1" comment="evolution-devel-docs is &lt;3.28.5-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827709" version="1" comment="evolution-ews is &lt;3.28.5-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827710" version="1" comment="evolution-ews-langpacks is &lt;3.28.5-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827711" version="1" comment="evolution-help is &lt;3.28.5-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827712" version="1" comment="evolution-langpacks is &lt;3.28.5-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827713" version="1" comment="evolution-pst is &lt;3.28.5-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827714" version="1" comment="evolution-spamassassin is &lt;3.28.5-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827715" version="1" comment="net-snmp is &lt;5.7.2-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827716" version="1" comment="net-snmp-agent-libs is &lt;5.7.2-47.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827717" version="1" comment="net-snmp-devel is &lt;5.7.2-47.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827718" version="1" comment="net-snmp-gui is &lt;5.7.2-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827719" version="1" comment="net-snmp-libs is &lt;5.7.2-47.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827720" version="1" comment="net-snmp-perl is &lt;5.7.2-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827721" version="1" comment="net-snmp-python is &lt;5.7.2-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827722" version="1" comment="net-snmp-sysvinit is &lt;5.7.2-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827723" version="1" comment="net-snmp-utils is &lt;5.7.2-47.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827724" version="1" comment="ctdb is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827725" version="1" comment="ctdb-tests is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827726" version="1" comment="libsmbclient is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827727" version="1" comment="libsmbclient-devel is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827728" version="1" comment="libwbclient is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827729" version="1" comment="libwbclient-devel is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827730" version="1" comment="samba is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827731" version="1" comment="samba-client is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827732" version="1" comment="samba-client-libs is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827733" version="1" comment="samba-common is &lt;4.10.4-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827734" version="1" comment="samba-common-libs is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827735" version="1" comment="samba-common-tools is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827736" version="1" comment="samba-dc is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827737" version="1" comment="samba-dc-libs is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827738" version="1" comment="samba-devel is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827739" version="1" comment="samba-krb5-printing is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827740" version="1" comment="samba-libs is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827741" version="1" comment="samba-pidl is &lt;4.10.4-10.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827742" version="1" comment="samba-python is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827743" version="1" comment="samba-python-test is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827744" version="1" comment="samba-test is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827745" version="1" comment="samba-test-libs is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827746" version="1" comment="samba-vfs-glusterfs is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827747" version="1" comment="samba-winbind is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827748" version="1" comment="samba-winbind-clients is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827749" version="1" comment="samba-winbind-krb5-locator is &lt;4.10.4-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827750" version="1" comment="samba-winbind-modules is &lt;4.10.4-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827751" version="1" comment="python-twisted-web is &lt;12.1.0-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827752" version="1" comment="mariadb is &lt;5.5.65-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827753" version="1" comment="mariadb-bench is &lt;5.5.65-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827754" version="1" comment="mariadb-devel is &lt;5.5.65-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827755" version="1" comment="mariadb-embedded is &lt;5.5.65-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827756" version="1" comment="mariadb-embedded-devel is &lt;5.5.65-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827757" version="1" comment="mariadb-libs is &lt;5.5.65-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827758" version="1" comment="mariadb-server is &lt;5.5.65-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827759" version="1" comment="mariadb-test is &lt;5.5.65-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827760" version="1" comment="bluez is &lt;5.44-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827761" version="1" comment="bluez-cups is &lt;5.44-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827762" version="1" comment="bluez-hid2hci is &lt;5.44-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827763" version="1" comment="bluez-libs is &lt;5.44-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827764" version="1" comment="bluez-libs-devel is &lt;5.44-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827765" version="1" comment="php is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827766" version="1" comment="php-bcmath is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827767" version="1" comment="php-cli is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827768" version="1" comment="php-common is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827769" version="1" comment="php-dba is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827770" version="1" comment="php-devel is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827771" version="1" comment="php-embedded is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827772" version="1" comment="php-enchant is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827773" version="1" comment="php-fpm is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827774" version="1" comment="php-gd is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827775" version="1" comment="php-intl is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827776" version="1" comment="php-ldap is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827777" version="1" comment="php-mbstring is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827778" version="1" comment="php-mysql is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827779" version="1" comment="php-mysqlnd is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827780" version="1" comment="php-odbc is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827781" version="1" comment="php-pdo is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827782" version="1" comment="php-pgsql is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827783" version="1" comment="php-process is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827784" version="1" comment="php-pspell is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827785" version="1" comment="php-recode is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827786" version="1" comment="php-snmp is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827787" version="1" comment="php-soap is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827788" version="1" comment="php-xml is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827789" version="1" comment="php-xmlrpc is &lt;5.4.16-48.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827790" version="1" comment="bash is &lt;4.2.46-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827791" version="1" comment="bash-doc is &lt;4.2.46-34.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827792" version="1" comment="qemu-img is &lt;1.5.3-173.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827793" version="1" comment="qemu-kvm is &lt;1.5.3-173.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827794" version="1" comment="qemu-kvm-common is &lt;1.5.3-173.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827795" version="1" comment="qemu-kvm-tools is &lt;1.5.3-173.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827796" version="1" comment="httpd is &lt;2.4.6-93.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827797" version="1" comment="httpd-devel is &lt;2.4.6-93.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827798" version="1" comment="httpd-manual is &lt;2.4.6-93.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827799" version="1" comment="httpd-tools is &lt;2.4.6-93.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827800" version="1" comment="mod_ldap is &lt;2.4.6-93.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827801" version="1" comment="mod_proxy_html is &lt;2.4.6-93.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827802" version="1" comment="mod_session is &lt;2.4.6-93.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827803" version="1" comment="mod_ssl is &lt;2.4.6-93.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827804" version="1" comment="mutt is &lt;1.5.21-29.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827805" version="1" comment="python is &lt;2.7.5-88.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827806" version="1" comment="python-debug is &lt;2.7.5-88.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827807" version="1" comment="python-devel is &lt;2.7.5-88.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827808" version="1" comment="python-libs is &lt;2.7.5-88.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827809" version="1" comment="python-test is &lt;2.7.5-88.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827810" version="1" comment="python-tools is &lt;2.7.5-88.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827811" version="1" comment="tkinter is &lt;2.7.5-88.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827812" version="1" comment="python3 is &lt;3.6.8-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827813" version="1" comment="python3-debug is &lt;3.6.8-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827814" version="1" comment="python3-devel is &lt;3.6.8-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827815" version="1" comment="python3-idle is &lt;3.6.8-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827816" version="1" comment="python3-libs is &lt;3.6.8-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827817" version="1" comment="python3-test is &lt;3.6.8-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827818" version="1" comment="python3-tkinter is &lt;3.6.8-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827819" version="1" comment="polkit is &lt;0.112-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827820" version="1" comment="polkit-devel is &lt;0.112-26.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827821" version="1" comment="polkit-docs is &lt;0.112-26.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827822" version="1" comment="emacs-gettext is &lt;0.19.8.1-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827823" version="1" comment="gettext is &lt;0.19.8.1-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827824" version="1" comment="gettext-common-devel is &lt;0.19.8.1-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827825" version="1" comment="gettext-devel is &lt;0.19.8.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827826" version="1" comment="gettext-libs is &lt;0.19.8.1-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827827" version="1" comment="nbdkit is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827828" version="1" comment="nbdkit-basic-plugins is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827829" version="1" comment="nbdkit-devel is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827830" version="1" comment="nbdkit-example-plugins is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827831" version="1" comment="nbdkit-plugin-python-common is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827832" version="1" comment="nbdkit-plugin-python2 is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827833" version="1" comment="nbdkit-plugin-vddk is &lt;1.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009193579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827834" version="1" comment="qt is &lt;4.8.7-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827835" version="1" comment="qt-assistant is &lt;4.8.7-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827836" version="1" comment="qt-config is &lt;4.8.7-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827837" version="1" comment="qt-demos is &lt;4.8.7-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827838" version="1" comment="qt-devel is &lt;4.8.7-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827839" version="1" comment="qt-devel-private is &lt;4.8.7-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827840" version="1" comment="qt-doc is &lt;4.8.7-8.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827841" version="1" comment="qt-examples is &lt;4.8.7-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827842" version="1" comment="qt-mysql is &lt;4.8.7-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827843" version="1" comment="qt-odbc is &lt;4.8.7-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827844" version="1" comment="qt-postgresql is &lt;4.8.7-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827845" version="1" comment="qt-qdbusviewer is &lt;4.8.7-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827846" version="1" comment="qt-qvfb is &lt;4.8.7-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827847" version="1" comment="qt-x11 is &lt;4.8.7-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827848" version="1" comment="okular is &lt;4.10.5-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827849" version="1" comment="okular-devel is &lt;4.10.5-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827850" version="1" comment="okular-libs is &lt;4.10.5-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827851" version="1" comment="okular-part is &lt;4.10.5-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827852" version="1" comment="taglib is &lt;1.8-8.20130218git.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827853" version="1" comment="taglib-devel is &lt;1.8-8.20130218git.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827854" version="1" comment="taglib-doc is &lt;1.8-8.20130218git.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827855" version="1" comment="avahi is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827856" version="1" comment="avahi-autoipd is &lt;0.6.31-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827857" version="1" comment="avahi-compat-howl is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827858" version="1" comment="avahi-compat-howl-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827859" version="1" comment="avahi-compat-libdns_sd is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827860" version="1" comment="avahi-compat-libdns_sd-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827861" version="1" comment="avahi-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827862" version="1" comment="avahi-dnsconfd is &lt;0.6.31-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827863" version="1" comment="avahi-glib is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827864" version="1" comment="avahi-glib-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827865" version="1" comment="avahi-gobject is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827866" version="1" comment="avahi-gobject-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827867" version="1" comment="avahi-libs is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827868" version="1" comment="avahi-qt3 is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827869" version="1" comment="avahi-qt3-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827870" version="1" comment="avahi-qt4 is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827871" version="1" comment="avahi-qt4-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827872" version="1" comment="avahi-tools is &lt;0.6.31-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827873" version="1" comment="avahi-ui is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827874" version="1" comment="avahi-ui-devel is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827875" version="1" comment="avahi-ui-gtk3 is &lt;0.6.31-20.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827876" version="1" comment="avahi-ui-tools is &lt;0.6.31-20.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827877" version="1" comment="zziplib is &lt;0.13.62-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827878" version="1" comment="zziplib-devel is &lt;0.13.62-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827879" version="1" comment="zziplib-utils is &lt;0.13.62-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827880" version="1" comment="ImageMagick is &lt;6.9.10.68-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827881" version="1" comment="ImageMagick-c++ is &lt;6.9.10.68-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827882" version="1" comment="ImageMagick-c++-devel is &lt;6.9.10.68-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827883" version="1" comment="ImageMagick-devel is &lt;6.9.10.68-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827884" version="1" comment="ImageMagick-doc is &lt;6.9.10.68-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827885" version="1" comment="ImageMagick-perl is &lt;6.9.10.68-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827886" version="1" comment="autotrace is &lt;0.31.1-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827887" version="1" comment="autotrace-devel is &lt;0.31.1-38.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827888" version="1" comment="emacs is &lt;24.3-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827889" version="1" comment="emacs-common is &lt;24.3-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827890" version="1" comment="emacs-el is &lt;24.3-23.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827891" version="1" comment="emacs-filesystem is &lt;24.3-23.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827892" version="1" comment="emacs-nox is &lt;24.3-23.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827893" version="1" comment="emacs-terminal is &lt;24.3-23.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827894" version="1" comment="inkscape is &lt;0.92.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827895" version="1" comment="inkscape-docs is &lt;0.92.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827896" version="1" comment="inkscape-view is &lt;0.92.2-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827897" version="1" comment="unzip is &lt;6.0-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827898" version="1" comment="libsndfile is &lt;1.0.25-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827899" version="1" comment="libsndfile-devel is &lt;1.0.25-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827900" version="1" comment="libsndfile-utils is &lt;1.0.25-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827901" version="1" comment="libqb is &lt;1.0.1-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827902" version="1" comment="libqb-devel is &lt;1.0.1-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827903" version="1" comment="libxml2 is &lt;2.9.1-6.el7.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827904" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827905" version="1" comment="libxml2-python is &lt;2.9.1-6.el7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827906" version="1" comment="libxml2-static is &lt;2.9.1-6.el7.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827907" version="1" comment="qemu-img is &lt;1.5.3-173.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827908" version="1" comment="qemu-kvm is &lt;1.5.3-173.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827909" version="1" comment="qemu-kvm-common is &lt;1.5.3-173.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827910" version="1" comment="qemu-kvm-tools is &lt;1.5.3-173.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827911" version="1" comment="telnet is &lt;0.17-65.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827912" version="1" comment="telnet-server is &lt;0.17-65.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827913" version="1" comment="firefox is &lt;68.6.1-1.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827914" version="1" comment="firefox is &lt;68.7.0-2.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827915" version="1" comment="thunderbird is &lt;68.7.0-1.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827916" version="1" comment="java-1.7.0-openjdk is &lt;1.7.0.261-2.6.22.2.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827917" version="1" comment="java-1.7.0-openjdk-accessibility is &lt;1.7.0.261-2.6.22.2.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827918" version="1" comment="java-1.7.0-openjdk-demo is &lt;1.7.0.261-2.6.22.2.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827919" version="1" comment="java-1.7.0-openjdk-devel is &lt;1.7.0.261-2.6.22.2.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827920" version="1" comment="java-1.7.0-openjdk-headless is &lt;1.7.0.261-2.6.22.2.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827921" version="1" comment="java-1.7.0-openjdk-javadoc is &lt;1.7.0.261-2.6.22.2.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827922" version="1" comment="java-1.7.0-openjdk-src is &lt;1.7.0.261-2.6.22.2.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827923" version="1" comment="java-11-openjdk is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827924" version="1" comment="java-11-openjdk-demo is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827925" version="1" comment="java-11-openjdk-devel is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827926" version="1" comment="java-11-openjdk-headless is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827927" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827928" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827929" version="1" comment="java-11-openjdk-jmods is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827930" version="1" comment="java-11-openjdk-src is &lt;11.0.7.10-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827931" version="1" comment="emacs-git is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827932" version="1" comment="emacs-git-el is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827933" version="1" comment="git is &lt;1.8.3.1-22.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827934" version="1" comment="git-all is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827935" version="1" comment="git-bzr is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827936" version="1" comment="git-cvs is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827937" version="1" comment="git-daemon is &lt;1.8.3.1-22.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827938" version="1" comment="git-email is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827939" version="1" comment="git-gnome-keyring is &lt;1.8.3.1-22.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827940" version="1" comment="git-gui is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827941" version="1" comment="git-hg is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827942" version="1" comment="git-instaweb is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827943" version="1" comment="git-p4 is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827944" version="1" comment="git-svn is &lt;1.8.3.1-22.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827945" version="1" comment="gitk is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827946" version="1" comment="gitweb is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827947" version="1" comment="perl-Git is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827948" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-22.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827949" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.252.b09-2.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827950" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.252.b09-2.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827951" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.252.b09-2.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827952" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.252.b09-2.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827953" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.252.b09-2.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827954" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.252.b09-2.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827955" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.252.b09-2.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827956" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.252.b09-2.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827957" version="1" comment="python-twisted-web is &lt;12.1.0-7.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827958" version="1" comment="firefox is &lt;68.8.0-1.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827959" version="1" comment="squid is &lt;3.5.20-15.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827960" version="1" comment="squid-migration-script is &lt;3.5.20-15.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827961" version="1" comment="squid-sysvinit is &lt;3.5.20-15.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827962" version="1" comment="thunderbird is &lt;68.8.0-1.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827963" version="1" comment="python3-pip is &lt;9.0.3-7.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827964" version="1" comment="python-virtualenv is &lt;15.1.0-4.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827965" version="1" comment="bpftool is &lt;3.10.0-1127.8.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827966" version="1" comment="kernel is &lt;3.10.0-1127.8.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827967" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1127.8.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827968" version="1" comment="kernel-debug is &lt;3.10.0-1127.8.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827971" version="1" comment="kernel-doc is &lt;3.10.0-1127.8.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827972" version="1" comment="kernel-headers is &lt;3.10.0-1127.8.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827973" version="1" comment="kernel-tools is &lt;3.10.0-1127.8.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827974" version="1" comment="kernel-tools-libs is &lt;3.10.0-1127.8.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827976" version="1" comment="perf is &lt;3.10.0-1127.8.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827977" version="1" comment="python-perf is &lt;3.10.0-1127.8.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827978" version="1" comment="emacs-git is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827979" version="1" comment="emacs-git-el is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827980" version="1" comment="git is &lt;1.8.3.1-23.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827981" version="1" comment="git-all is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827982" version="1" comment="git-bzr is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827983" version="1" comment="git-cvs is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827984" version="1" comment="git-daemon is &lt;1.8.3.1-23.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827985" version="1" comment="git-email is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827986" version="1" comment="git-gnome-keyring is &lt;1.8.3.1-23.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827987" version="1" comment="git-gui is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827988" version="1" comment="git-hg is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827989" version="1" comment="git-instaweb is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827990" version="1" comment="git-p4 is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827991" version="1" comment="git-svn is &lt;1.8.3.1-23.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827992" version="1" comment="gitk is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827993" version="1" comment="gitweb is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827994" version="1" comment="perl-Git is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827995" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-23.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827996" version="1" comment="bind is &lt;9.11.4-16.P2.el7_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827997" version="1" comment="bind-chroot is &lt;9.11.4-16.P2.el7_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827998" version="1" comment="bind-devel is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009827999" version="1" comment="bind-export-devel is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828000" version="1" comment="bind-export-libs is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828001" version="1" comment="bind-libs is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828002" version="1" comment="bind-libs-lite is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828003" version="1" comment="bind-license is &lt;9.11.4-16.P2.el7_8.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828004" version="1" comment="bind-lite-devel is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828005" version="1" comment="bind-pkcs11 is &lt;9.11.4-16.P2.el7_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828006" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828007" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-16.P2.el7_8.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828008" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-16.P2.el7_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828009" version="1" comment="bind-sdb is &lt;9.11.4-16.P2.el7_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828010" version="1" comment="bind-sdb-chroot is &lt;9.11.4-16.P2.el7_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828011" version="1" comment="bind-utils is &lt;9.11.4-16.P2.el7_8.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828012" version="1" comment="firefox is &lt;68.9.0-1.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828013" version="1" comment="freerdp is &lt;2.0.0-4.rc4.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828014" version="1" comment="freerdp-devel is &lt;2.0.0-4.rc4.el7_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828015" version="1" comment="freerdp-libs is &lt;2.0.0-4.rc4.el7_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828016" version="1" comment="libwinpr is &lt;2.0.0-4.rc4.el7_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828017" version="1" comment="libwinpr-devel is &lt;2.0.0-4.rc4.el7_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828018" version="1" comment="unbound is &lt;1.6.6-4.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828019" version="1" comment="unbound-libs is &lt;1.6.6-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828020" version="1" comment="microcode_ctl is &lt;2.1-61.6.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828021" version="1" comment="tomcat is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828022" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828023" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828024" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828025" version="1" comment="tomcat-javadoc is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828026" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828027" version="1" comment="tomcat-jsvc is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828028" version="1" comment="tomcat-lib is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828029" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828030" version="1" comment="tomcat-webapps is &lt;7.0.76-12.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828031" version="1" comment="libexif is &lt;0.6.21-7.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828032" version="1" comment="libexif-devel is &lt;0.6.21-7.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828033" version="1" comment="libexif-doc is &lt;0.6.21-7.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828034" version="1" comment="thunderbird is &lt;68.9.0-1.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828035" version="1" comment="unbound is &lt;1.6.6-5.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828036" version="1" comment="unbound-devel is &lt;1.6.6-5.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828037" version="1" comment="unbound-libs is &lt;1.6.6-5.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828038" version="1" comment="unbound-python is &lt;1.6.6-5.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828039" version="1" comment="ntp is &lt;4.2.6p5-29.el7_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828040" version="1" comment="ntp-doc is &lt;4.2.6p5-29.el7_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828041" version="1" comment="ntp-perl is &lt;4.2.6p5-29.el7_8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828042" version="1" comment="ntpdate is &lt;4.2.6p5-29.el7_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828043" version="1" comment="sntp is &lt;4.2.6p5-29.el7_8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828044" version="1" comment="bpftool is &lt;3.10.0-1127.13.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828045" version="1" comment="kernel is &lt;3.10.0-1127.13.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828046" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1127.13.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828047" version="1" comment="kernel-debug is &lt;3.10.0-1127.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828050" version="1" comment="kernel-doc is &lt;3.10.0-1127.13.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828051" version="1" comment="kernel-headers is &lt;3.10.0-1127.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828052" version="1" comment="kernel-tools is &lt;3.10.0-1127.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828053" version="1" comment="kernel-tools-libs is &lt;3.10.0-1127.13.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828055" version="1" comment="perf is &lt;3.10.0-1127.13.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828056" version="1" comment="python-perf is &lt;3.10.0-1127.13.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828057" version="1" comment="firefox is &lt;68.10.0-1.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828058" version="1" comment="dbus is &lt;1.10.24-14.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828059" version="1" comment="dbus-devel is &lt;1.10.24-14.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828060" version="1" comment="dbus-doc is &lt;1.10.24-14.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828061" version="1" comment="dbus-libs is &lt;1.10.24-14.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828062" version="1" comment="dbus-tests is &lt;1.10.24-14.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828063" version="1" comment="dbus-x11 is &lt;1.10.24-14.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828064" version="1" comment="thunderbird is &lt;68.10.0-1.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828065" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.262.b10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828066" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.262.b10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828067" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.262.b10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828068" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.262.b10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828069" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.262.b10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828070" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.262.b10-0.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828071" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.262.b10-0.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828072" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.262.b10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828073" version="1" comment="java-11-openjdk is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828074" version="1" comment="java-11-openjdk-demo is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828075" version="1" comment="java-11-openjdk-devel is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828076" version="1" comment="java-11-openjdk-headless is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828077" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828078" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828079" version="1" comment="java-11-openjdk-jmods is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828080" version="1" comment="java-11-openjdk-src is &lt;11.0.8.10-0.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828081" version="1" comment="bpftool is &lt;3.10.0-1127.18.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828082" version="1" comment="kernel is &lt;3.10.0-1127.18.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828083" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1127.18.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828084" version="1" comment="kernel-debug is &lt;3.10.0-1127.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828087" version="1" comment="kernel-doc is &lt;3.10.0-1127.18.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828088" version="1" comment="kernel-headers is &lt;3.10.0-1127.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828089" version="1" comment="kernel-tools is &lt;3.10.0-1127.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828090" version="1" comment="kernel-tools-libs is &lt;3.10.0-1127.18.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828092" version="1" comment="perf is &lt;3.10.0-1127.18.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828093" version="1" comment="python-perf is &lt;3.10.0-1127.18.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828094" version="1" comment="firefox is &lt;68.11.0-1.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828095" version="1" comment="libvncserver is &lt;0.9.9-14.el7_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828096" version="1" comment="libvncserver-devel is &lt;0.9.9-14.el7_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828097" version="1" comment="postgresql-jdbc is &lt;9.2.1002-8.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828098" version="1" comment="postgresql-jdbc-javadoc is &lt;9.2.1002-8.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828099" version="1" comment="thunderbird is &lt;68.11.0-1.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828100" version="1" comment="firefox is &lt;68.12.0-1.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828101" version="1" comment="dovecot is &lt;2.2.36-6.el7_8.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828102" version="1" comment="dovecot-devel is &lt;2.2.36-6.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828103" version="1" comment="dovecot-mysql is &lt;2.2.36-6.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828104" version="1" comment="dovecot-pgsql is &lt;2.2.36-6.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828105" version="1" comment="dovecot-pigeonhole is &lt;2.2.36-6.el7_8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828106" version="1" comment="thunderbird is &lt;68.12.0-1.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828107" version="1" comment="libmspack is &lt;0.5-0.8.alpha.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828108" version="1" comment="libmspack-devel is &lt;0.5-0.8.alpha.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828109" version="1" comment="glibc is &lt;2.17-317.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828110" version="1" comment="glibc-common is &lt;2.17-317.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828111" version="1" comment="glibc-devel is &lt;2.17-317.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828112" version="1" comment="glibc-headers is &lt;2.17-317.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828113" version="1" comment="glibc-static is &lt;2.17-317.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828114" version="1" comment="glibc-utils is &lt;2.17-317.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828115" version="1" comment="nscd is &lt;2.17-317.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828116" version="1" comment="cups is &lt;1.6.3-51.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828117" version="1" comment="cups-client is &lt;1.6.3-51.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828118" version="1" comment="cups-devel is &lt;1.6.3-51.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828119" version="1" comment="cups-filesystem is &lt;1.6.3-51.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828120" version="1" comment="cups-ipptool is &lt;1.6.3-51.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828121" version="1" comment="cups-libs is &lt;1.6.3-51.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828122" version="1" comment="cups-lpd is &lt;1.6.3-51.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828123" version="1" comment="SDL is &lt;1.2.15-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828124" version="1" comment="SDL-devel is &lt;1.2.15-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828125" version="1" comment="SDL-static is &lt;1.2.15-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828126" version="1" comment="pcp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828127" version="1" comment="pcp-conf is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828128" version="1" comment="pcp-devel is &lt;4.3.2-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828129" version="1" comment="pcp-doc is &lt;4.3.2-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828130" version="1" comment="pcp-export-pcp2elasticsearch is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828131" version="1" comment="pcp-export-pcp2graphite is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828132" version="1" comment="pcp-export-pcp2influxdb is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828133" version="1" comment="pcp-export-pcp2json is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828134" version="1" comment="pcp-export-pcp2spark is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828135" version="1" comment="pcp-export-pcp2xml is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828136" version="1" comment="pcp-export-pcp2zabbix is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828137" version="1" comment="pcp-export-zabbix-agent is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828138" version="1" comment="pcp-gui is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828139" version="1" comment="pcp-import-collectl2pcp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828140" version="1" comment="pcp-import-ganglia2pcp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828141" version="1" comment="pcp-import-iostat2pcp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828142" version="1" comment="pcp-import-mrtg2pcp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828143" version="1" comment="pcp-import-sar2pcp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828144" version="1" comment="pcp-libs is &lt;4.3.2-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828145" version="1" comment="pcp-libs-devel is &lt;4.3.2-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828146" version="1" comment="pcp-manager is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828147" version="1" comment="pcp-pmda-activemq is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828148" version="1" comment="pcp-pmda-apache is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828149" version="1" comment="pcp-pmda-bash is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828150" version="1" comment="pcp-pmda-bcc is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828151" version="1" comment="pcp-pmda-bind2 is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828152" version="1" comment="pcp-pmda-bonding is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828153" version="1" comment="pcp-pmda-cifs is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828154" version="1" comment="pcp-pmda-cisco is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828155" version="1" comment="pcp-pmda-dbping is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828156" version="1" comment="pcp-pmda-dm is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828157" version="1" comment="pcp-pmda-docker is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828158" version="1" comment="pcp-pmda-ds389 is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828159" version="1" comment="pcp-pmda-ds389log is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828160" version="1" comment="pcp-pmda-elasticsearch is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828161" version="1" comment="pcp-pmda-gfs2 is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828162" version="1" comment="pcp-pmda-gluster is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828163" version="1" comment="pcp-pmda-gpfs is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828164" version="1" comment="pcp-pmda-gpsd is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828165" version="1" comment="pcp-pmda-haproxy is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828166" version="1" comment="pcp-pmda-infiniband is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828167" version="1" comment="pcp-pmda-json is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828168" version="1" comment="pcp-pmda-libvirt is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828169" version="1" comment="pcp-pmda-lio is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828170" version="1" comment="pcp-pmda-lmsensors is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828171" version="1" comment="pcp-pmda-logger is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828172" version="1" comment="pcp-pmda-lustre is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828173" version="1" comment="pcp-pmda-lustrecomm is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828174" version="1" comment="pcp-pmda-mailq is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828175" version="1" comment="pcp-pmda-memcache is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828176" version="1" comment="pcp-pmda-mic is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828177" version="1" comment="pcp-pmda-mounts is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828178" version="1" comment="pcp-pmda-mysql is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828179" version="1" comment="pcp-pmda-named is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828180" version="1" comment="pcp-pmda-netfilter is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828181" version="1" comment="pcp-pmda-news is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828182" version="1" comment="pcp-pmda-nfsclient is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828183" version="1" comment="pcp-pmda-nginx is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828184" version="1" comment="pcp-pmda-nvidia-gpu is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828185" version="1" comment="pcp-pmda-oracle is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828186" version="1" comment="pcp-pmda-pdns is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828187" version="1" comment="pcp-pmda-perfevent is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828188" version="1" comment="pcp-pmda-postfix is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828189" version="1" comment="pcp-pmda-postgresql is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828190" version="1" comment="pcp-pmda-prometheus is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828191" version="1" comment="pcp-pmda-redis is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828192" version="1" comment="pcp-pmda-roomtemp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828193" version="1" comment="pcp-pmda-rpm is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828194" version="1" comment="pcp-pmda-rsyslog is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828195" version="1" comment="pcp-pmda-samba is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828196" version="1" comment="pcp-pmda-sendmail is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828197" version="1" comment="pcp-pmda-shping is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828198" version="1" comment="pcp-pmda-slurm is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828199" version="1" comment="pcp-pmda-smart is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828200" version="1" comment="pcp-pmda-snmp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828201" version="1" comment="pcp-pmda-summary is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828202" version="1" comment="pcp-pmda-systemd is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828203" version="1" comment="pcp-pmda-trace is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828204" version="1" comment="pcp-pmda-unbound is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828205" version="1" comment="pcp-pmda-vmware is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828206" version="1" comment="pcp-pmda-weblog is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828207" version="1" comment="pcp-pmda-zimbra is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828208" version="1" comment="pcp-pmda-zswap is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828209" version="1" comment="pcp-selinux is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828210" version="1" comment="pcp-system-tools is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828211" version="1" comment="pcp-testsuite is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828212" version="1" comment="pcp-webapi is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828213" version="1" comment="pcp-webapp-blinkenlights is &lt;4.3.2-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828214" version="1" comment="pcp-webapp-grafana is &lt;4.3.2-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828215" version="1" comment="pcp-webapp-graphite is &lt;4.3.2-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828216" version="1" comment="pcp-webapp-vector is &lt;4.3.2-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828217" version="1" comment="pcp-webjs is &lt;4.3.2-12.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828218" version="1" comment="pcp-zeroconf is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828219" version="1" comment="perl-PCP-LogImport is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828220" version="1" comment="perl-PCP-LogSummary is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828221" version="1" comment="perl-PCP-MMV is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828222" version="1" comment="perl-PCP-PMDA is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828223" version="1" comment="python-pcp is &lt;4.3.2-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828224" version="1" comment="libsrtp is &lt;1.4.4-11.20101004cvs.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828225" version="1" comment="libsrtp-devel is &lt;1.4.4-11.20101004cvs.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828226" version="1" comment="tigervnc is &lt;1.8.0-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828227" version="1" comment="tigervnc-icons is &lt;1.8.0-21.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828228" version="1" comment="tigervnc-license is &lt;1.8.0-21.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828229" version="1" comment="tigervnc-server is &lt;1.8.0-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828230" version="1" comment="tigervnc-server-applet is &lt;1.8.0-21.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828231" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828232" version="1" comment="tigervnc-server-module is &lt;1.8.0-21.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828233" version="1" comment="libvpx is &lt;1.3.0-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828234" version="1" comment="libvpx-devel is &lt;1.3.0-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828235" version="1" comment="libvpx-utils is &lt;1.3.0-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828236" version="1" comment="audiofile is &lt;0.3.6-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828237" version="1" comment="audiofile-devel is &lt;0.3.6-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828238" version="1" comment="dnsmasq is &lt;2.76-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828239" version="1" comment="dnsmasq-utils is &lt;2.76-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828240" version="1" comment="python-pillow is &lt;2.0.0-21.gitd1c6db8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828241" version="1" comment="python-pillow-devel is &lt;2.0.0-21.gitd1c6db8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828242" version="1" comment="python-pillow-doc is &lt;2.0.0-21.gitd1c6db8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828243" version="1" comment="python-pillow-qt is &lt;2.0.0-21.gitd1c6db8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828244" version="1" comment="python-pillow-sane is &lt;2.0.0-21.gitd1c6db8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828245" version="1" comment="python-pillow-tk is &lt;2.0.0-21.gitd1c6db8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828246" version="1" comment="python3 is &lt;3.6.8-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828247" version="1" comment="python3-debug is &lt;3.6.8-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828248" version="1" comment="python3-devel is &lt;3.6.8-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828249" version="1" comment="python3-idle is &lt;3.6.8-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828250" version="1" comment="python3-libs is &lt;3.6.8-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828251" version="1" comment="python3-test is &lt;3.6.8-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828252" version="1" comment="python3-tkinter is &lt;3.6.8-17.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828253" version="1" comment="cloud-init is &lt;19.4-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828254" version="1" comment="libpng is &lt;1.5.13-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828255" version="1" comment="libpng-devel is &lt;1.5.13-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828256" version="1" comment="libpng-static is &lt;1.5.13-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828257" version="1" comment="libtiff is &lt;4.0.3-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828258" version="1" comment="libtiff-devel is &lt;4.0.3-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828259" version="1" comment="libtiff-static is &lt;4.0.3-35.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009194999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828260" version="1" comment="libtiff-tools is &lt;4.0.3-35.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828261" version="1" comment="qemu-img is &lt;1.5.3-175.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828262" version="1" comment="qemu-kvm is &lt;1.5.3-175.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828263" version="1" comment="qemu-kvm-common is &lt;1.5.3-175.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828264" version="1" comment="qemu-kvm-tools is &lt;1.5.3-175.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828265" version="1" comment="cpio is &lt;2.11-28.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828266" version="1" comment="python is &lt;2.7.5-89.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828267" version="1" comment="python-debug is &lt;2.7.5-89.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828268" version="1" comment="python-devel is &lt;2.7.5-89.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828269" version="1" comment="python-libs is &lt;2.7.5-89.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828270" version="1" comment="python-test is &lt;2.7.5-89.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828271" version="1" comment="python-tools is &lt;2.7.5-89.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828272" version="1" comment="tkinter is &lt;2.7.5-89.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828273" version="1" comment="libssh2 is &lt;1.8.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828274" version="1" comment="libssh2-devel is &lt;1.8.0-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828275" version="1" comment="libssh2-docs is &lt;1.8.0-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828276" version="1" comment="curl is &lt;7.29.0-59.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828277" version="1" comment="libcurl is &lt;7.29.0-59.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828278" version="1" comment="libcurl-devel is &lt;7.29.0-59.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828279" version="1" comment="libsndfile is &lt;1.0.25-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828280" version="1" comment="libsndfile-devel is &lt;1.0.25-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828281" version="1" comment="libsndfile-utils is &lt;1.0.25-12.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828282" version="1" comment="ipa-client is &lt;4.6.8-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828283" version="1" comment="ipa-client-common is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828284" version="1" comment="ipa-common is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828285" version="1" comment="ipa-python-compat is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828286" version="1" comment="ipa-server is &lt;4.6.8-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828287" version="1" comment="ipa-server-common is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828288" version="1" comment="ipa-server-dns is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828289" version="1" comment="ipa-server-trust-ad is &lt;4.6.8-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828290" version="1" comment="python2-ipaclient is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828291" version="1" comment="python2-ipalib is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828292" version="1" comment="python2-ipaserver is &lt;4.6.8-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828293" version="1" comment="libwsman-devel is &lt;2.6.3-7.git4391e5c.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828294" version="1" comment="libwsman1 is &lt;2.6.3-7.git4391e5c.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828295" version="1" comment="openwsman-client is &lt;2.6.3-7.git4391e5c.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828296" version="1" comment="openwsman-perl is &lt;2.6.3-7.git4391e5c.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828297" version="1" comment="openwsman-python is &lt;2.6.3-7.git4391e5c.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828298" version="1" comment="openwsman-ruby is &lt;2.6.3-7.git4391e5c.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828299" version="1" comment="openwsman-server is &lt;2.6.3-7.git4391e5c.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828300" version="1" comment="libwmf is &lt;0.2.8.4-44.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828301" version="1" comment="libwmf-devel is &lt;0.2.8.4-44.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828302" version="1" comment="libwmf-lite is &lt;0.2.8.4-44.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828303" version="1" comment="librabbitmq is &lt;0.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828304" version="1" comment="librabbitmq-devel is &lt;0.8.0-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828305" version="1" comment="librabbitmq-examples is &lt;0.8.0-3.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828306" version="1" comment="expat is &lt;2.1.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828307" version="1" comment="expat-devel is &lt;2.1.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828308" version="1" comment="expat-static is &lt;2.1.0-12.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828309" version="1" comment="httpd is &lt;2.4.6-95.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828310" version="1" comment="httpd-devel is &lt;2.4.6-95.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828311" version="1" comment="httpd-manual is &lt;2.4.6-95.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828312" version="1" comment="httpd-tools is &lt;2.4.6-95.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828313" version="1" comment="mod_ldap is &lt;2.4.6-95.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828314" version="1" comment="mod_proxy_html is &lt;2.4.6-95.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828315" version="1" comment="mod_session is &lt;2.4.6-95.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828316" version="1" comment="mod_ssl is &lt;2.4.6-95.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828317" version="1" comment="fontforge is &lt;20120731b-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828318" version="1" comment="fontforge-devel is &lt;20120731b-13.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828319" version="1" comment="mod_auth_openidc is &lt;1.8.8-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828320" version="1" comment="hunspell is &lt;1.3.2-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828321" version="1" comment="hunspell-devel is &lt;1.3.2-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828322" version="1" comment="mod_dav_svn is &lt;1.7.14-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828323" version="1" comment="subversion is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828324" version="1" comment="subversion-devel is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828325" version="1" comment="subversion-gnome is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828326" version="1" comment="subversion-javahl is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828327" version="1" comment="subversion-kde is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828328" version="1" comment="subversion-libs is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828329" version="1" comment="subversion-perl is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828330" version="1" comment="subversion-python is &lt;1.7.14-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828331" version="1" comment="subversion-ruby is &lt;1.7.14-16.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828332" version="1" comment="subversion-tools is &lt;1.7.14-16.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828333" version="1" comment="spamassassin is &lt;3.4.0-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828334" version="1" comment="evince is &lt;3.28.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828335" version="1" comment="evince-browser-plugin is &lt;3.28.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828336" version="1" comment="evince-devel is &lt;3.28.2-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828337" version="1" comment="evince-dvi is &lt;3.28.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828338" version="1" comment="evince-libs is &lt;3.28.2-10.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828339" version="1" comment="evince-nautilus is &lt;3.28.2-10.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828340" version="1" comment="poppler is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828341" version="1" comment="poppler-cpp is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828342" version="1" comment="poppler-cpp-devel is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828343" version="1" comment="poppler-demos is &lt;0.26.5-43.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828344" version="1" comment="poppler-devel is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828345" version="1" comment="poppler-glib is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828346" version="1" comment="poppler-glib-devel is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828347" version="1" comment="poppler-qt is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828348" version="1" comment="poppler-qt-devel is &lt;0.26.5-43.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828349" version="1" comment="poppler-utils is &lt;0.26.5-43.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828350" version="1" comment="glib2 is &lt;2.56.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828351" version="1" comment="glib2-devel is &lt;2.56.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828352" version="1" comment="glib2-doc is &lt;2.56.1-7.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828353" version="1" comment="glib2-fam is &lt;2.56.1-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828354" version="1" comment="glib2-static is &lt;2.56.1-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828355" version="1" comment="glib2-tests is &lt;2.56.1-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828356" version="1" comment="ibus is &lt;1.5.17-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828357" version="1" comment="ibus-devel is &lt;1.5.17-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828358" version="1" comment="ibus-devel-docs is &lt;1.5.17-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828359" version="1" comment="ibus-gtk2 is &lt;1.5.17-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828360" version="1" comment="ibus-gtk3 is &lt;1.5.17-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828361" version="1" comment="ibus-libs is &lt;1.5.17-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828362" version="1" comment="ibus-pygtk2 is &lt;1.5.17-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828363" version="1" comment="ibus-setup is &lt;1.5.17-11.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828364" version="1" comment="ctdb is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828365" version="1" comment="ctdb-tests is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828366" version="1" comment="libsmbclient is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828367" version="1" comment="libsmbclient-devel is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828368" version="1" comment="libwbclient is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828369" version="1" comment="libwbclient-devel is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828370" version="1" comment="samba is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828371" version="1" comment="samba-client is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828372" version="1" comment="samba-client-libs is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828373" version="1" comment="samba-common is &lt;4.10.16-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828374" version="1" comment="samba-common-libs is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828375" version="1" comment="samba-common-tools is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828376" version="1" comment="samba-dc is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828377" version="1" comment="samba-dc-libs is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828378" version="1" comment="samba-devel is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828379" version="1" comment="samba-krb5-printing is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828380" version="1" comment="samba-libs is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828381" version="1" comment="samba-pidl is &lt;4.10.16-5.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828382" version="1" comment="samba-python is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828383" version="1" comment="samba-python-test is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828384" version="1" comment="samba-test is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828385" version="1" comment="samba-test-libs is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828386" version="1" comment="samba-vfs-glusterfs is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828387" version="1" comment="samba-winbind is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828388" version="1" comment="samba-winbind-clients is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828389" version="1" comment="samba-winbind-krb5-locator is &lt;4.10.16-5.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828390" version="1" comment="samba-winbind-modules is &lt;4.10.16-5.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828391" version="1" comment="freeradius is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828392" version="1" comment="freeradius-devel is &lt;3.0.13-15.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828393" version="1" comment="freeradius-doc is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828394" version="1" comment="freeradius-krb5 is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828395" version="1" comment="freeradius-ldap is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828396" version="1" comment="freeradius-mysql is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828397" version="1" comment="freeradius-perl is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828398" version="1" comment="freeradius-postgresql is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828399" version="1" comment="freeradius-python is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828400" version="1" comment="freeradius-sqlite is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828401" version="1" comment="freeradius-unixODBC is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828402" version="1" comment="freeradius-utils is &lt;3.0.13-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828403" version="1" comment="libxml2 is &lt;2.9.1-6.el7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828404" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828405" version="1" comment="libxml2-python is &lt;2.9.1-6.el7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828406" version="1" comment="libxml2-static is &lt;2.9.1-6.el7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828407" version="1" comment="libvirt is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828408" version="1" comment="libvirt-admin is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828409" version="1" comment="libvirt-bash-completion is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828410" version="1" comment="libvirt-client is &lt;4.5.0-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828411" version="1" comment="libvirt-daemon is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828412" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828413" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828414" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828415" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828416" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828417" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828418" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828419" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828420" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828421" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828422" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828423" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828424" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828425" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828426" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828427" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828428" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828429" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828430" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828431" version="1" comment="libvirt-daemon-lxc is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828432" version="1" comment="libvirt-devel is &lt;4.5.0-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828433" version="1" comment="libvirt-docs is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828434" version="1" comment="libvirt-libs is &lt;4.5.0-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828435" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828436" version="1" comment="libvirt-login-shell is &lt;4.5.0-36.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828437" version="1" comment="libvirt-nss is &lt;4.5.0-36.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828438" version="1" comment="bluez is &lt;5.44-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828439" version="1" comment="bluez-cups is &lt;5.44-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828440" version="1" comment="bluez-hid2hci is &lt;5.44-7.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828441" version="1" comment="bluez-libs is &lt;5.44-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828442" version="1" comment="bluez-libs-devel is &lt;5.44-7.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828443" version="1" comment="NetworkManager is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828444" version="1" comment="NetworkManager-adsl is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828445" version="1" comment="NetworkManager-bluetooth is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828446" version="1" comment="NetworkManager-config-server is &lt;1.18.8-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828447" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.18.8-1.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828448" version="1" comment="NetworkManager-glib is &lt;1.18.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828449" version="1" comment="NetworkManager-glib-devel is &lt;1.18.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828450" version="1" comment="NetworkManager-libnm is &lt;1.18.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828451" version="1" comment="NetworkManager-libnm-devel is &lt;1.18.8-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828452" version="1" comment="NetworkManager-ovs is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828453" version="1" comment="NetworkManager-ppp is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828454" version="1" comment="NetworkManager-team is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828455" version="1" comment="NetworkManager-tui is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828456" version="1" comment="NetworkManager-wifi is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828457" version="1" comment="NetworkManager-wwan is &lt;1.18.8-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828458" version="1" comment="tomcat is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828459" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828460" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828461" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828462" version="1" comment="tomcat-javadoc is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828463" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828464" version="1" comment="tomcat-jsvc is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828465" version="1" comment="tomcat-lib is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828466" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828467" version="1" comment="tomcat-webapps is &lt;7.0.76-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828468" version="1" comment="libxslt is &lt;1.1.28-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828469" version="1" comment="libxslt-devel is &lt;1.1.28-6.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828470" version="1" comment="libxslt-python is &lt;1.1.28-6.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828471" version="1" comment="libgudev1 is &lt;219-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828472" version="1" comment="libgudev1-devel is &lt;219-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828473" version="1" comment="systemd is &lt;219-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828474" version="1" comment="systemd-devel is &lt;219-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828475" version="1" comment="systemd-journal-gateway is &lt;219-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828476" version="1" comment="systemd-libs is &lt;219-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828477" version="1" comment="systemd-networkd is &lt;219-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828478" version="1" comment="systemd-python is &lt;219-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828479" version="1" comment="systemd-resolved is &lt;219-78.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828480" version="1" comment="systemd-sysv is &lt;219-78.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828481" version="1" comment="e2fsprogs is &lt;1.42.9-19.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828482" version="1" comment="e2fsprogs-devel is &lt;1.42.9-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828483" version="1" comment="e2fsprogs-libs is &lt;1.42.9-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828484" version="1" comment="e2fsprogs-static is &lt;1.42.9-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828485" version="1" comment="libcom_err is &lt;1.42.9-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828486" version="1" comment="libcom_err-devel is &lt;1.42.9-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828487" version="1" comment="libss is &lt;1.42.9-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828488" version="1" comment="libss-devel is &lt;1.42.9-19.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828489" version="1" comment="okular is &lt;4.10.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828490" version="1" comment="okular-devel is &lt;4.10.5-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828491" version="1" comment="okular-libs is &lt;4.10.5-9.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828492" version="1" comment="okular-part is &lt;4.10.5-9.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828493" version="1" comment="qt5-qtbase is &lt;5.9.7-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828494" version="1" comment="qt5-qtbase-common is &lt;5.9.7-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828495" version="1" comment="qt5-qtbase-devel is &lt;5.9.7-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828496" version="1" comment="qt5-qtbase-doc is &lt;5.9.7-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828497" version="1" comment="qt5-qtbase-examples is &lt;5.9.7-4.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828498" version="1" comment="qt5-qtbase-gui is &lt;5.9.7-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828499" version="1" comment="qt5-qtbase-mysql is &lt;5.9.7-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828500" version="1" comment="qt5-qtbase-odbc is &lt;5.9.7-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828501" version="1" comment="qt5-qtbase-postgresql is &lt;5.9.7-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828502" version="1" comment="qt5-qtbase-static is &lt;5.9.7-4.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828503" version="1" comment="qt5-rpm-macros is &lt;5.9.7-4.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828504" version="1" comment="mariadb is &lt;5.5.68-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828505" version="1" comment="mariadb-bench is &lt;5.5.68-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828506" version="1" comment="mariadb-devel is &lt;5.5.68-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828507" version="1" comment="mariadb-embedded is &lt;5.5.68-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828508" version="1" comment="mariadb-embedded-devel is &lt;5.5.68-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828509" version="1" comment="mariadb-libs is &lt;5.5.68-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828510" version="1" comment="mariadb-server is &lt;5.5.68-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828511" version="1" comment="mariadb-test is &lt;5.5.68-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828512" version="1" comment="exiv2 is &lt;0.27.0-3.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828513" version="1" comment="exiv2-devel is &lt;0.27.0-3.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828514" version="1" comment="exiv2-doc is &lt;0.27.0-3.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828515" version="1" comment="exiv2-libs is &lt;0.27.0-3.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828516" version="1" comment="freerdp is &lt;2.1.1-2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828517" version="1" comment="freerdp-devel is &lt;2.1.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828518" version="1" comment="freerdp-libs is &lt;2.1.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828519" version="1" comment="libwinpr is &lt;2.1.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828520" version="1" comment="libwinpr-devel is &lt;2.1.1-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828521" version="1" comment="dbus is &lt;1.10.24-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828522" version="1" comment="dbus-devel is &lt;1.10.24-15.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828523" version="1" comment="dbus-doc is &lt;1.10.24-15.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828524" version="1" comment="dbus-libs is &lt;1.10.24-15.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828525" version="1" comment="dbus-tests is &lt;1.10.24-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828526" version="1" comment="dbus-x11 is &lt;1.10.24-15.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828527" version="1" comment="webkitgtk4 is &lt;2.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828528" version="1" comment="webkitgtk4-devel is &lt;2.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828529" version="1" comment="webkitgtk4-doc is &lt;2.28.2-2.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828530" version="1" comment="webkitgtk4-jsc is &lt;2.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828531" version="1" comment="webkitgtk4-jsc-devel is &lt;2.28.2-2.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828532" version="1" comment="OpenEXR is &lt;1.7.1-8.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828533" version="1" comment="OpenEXR-devel is &lt;1.7.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828534" version="1" comment="OpenEXR-libs is &lt;1.7.1-8.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828535" version="1" comment="libexif is &lt;0.6.22-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828536" version="1" comment="libexif-devel is &lt;0.6.22-1.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828537" version="1" comment="libexif-doc is &lt;0.6.22-1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828538" version="1" comment="openldap is &lt;2.4.44-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828539" version="1" comment="openldap-clients is &lt;2.4.44-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828540" version="1" comment="openldap-devel is &lt;2.4.44-22.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828541" version="1" comment="openldap-servers is &lt;2.4.44-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828542" version="1" comment="openldap-servers-sql is &lt;2.4.44-22.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828543" version="1" comment="bpftool is &lt;3.10.0-1160.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828544" version="1" comment="kernel is &lt;3.10.0-1160.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828545" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828546" version="1" comment="kernel-debug is &lt;3.10.0-1160.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828549" version="1" comment="kernel-doc is &lt;3.10.0-1160.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828550" version="1" comment="kernel-headers is &lt;3.10.0-1160.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828551" version="1" comment="kernel-tools is &lt;3.10.0-1160.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828552" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828554" version="1" comment="perf is &lt;3.10.0-1160.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828555" version="1" comment="python-perf is &lt;3.10.0-1160.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828556" version="1" comment="libcroco is &lt;0.6.12-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828557" version="1" comment="libcroco-devel is &lt;0.6.12-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828558" version="1" comment="nspr is &lt;4.25.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828559" version="1" comment="nspr-devel is &lt;4.25.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828560" version="1" comment="nss is &lt;3.53.1-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828561" version="1" comment="nss-devel is &lt;3.53.1-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828562" version="1" comment="nss-pkcs11-devel is &lt;3.53.1-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828563" version="1" comment="nss-softokn is &lt;3.53.1-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828564" version="1" comment="nss-softokn-devel is &lt;3.53.1-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828565" version="1" comment="nss-softokn-freebl is &lt;3.53.1-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828566" version="1" comment="nss-softokn-freebl-devel is &lt;3.53.1-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828567" version="1" comment="nss-sysinit is &lt;3.53.1-3.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828568" version="1" comment="nss-tools is &lt;3.53.1-3.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828569" version="1" comment="nss-util is &lt;3.53.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828570" version="1" comment="nss-util-devel is &lt;3.53.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828571" version="1" comment="qemu-img is &lt;1.5.3-175.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828572" version="1" comment="qemu-kvm is &lt;1.5.3-175.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828573" version="1" comment="qemu-kvm-common is &lt;1.5.3-175.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828574" version="1" comment="qemu-kvm-tools is &lt;1.5.3-175.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828575" version="1" comment="firefox is &lt;78.3.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828576" version="1" comment="squid is &lt;3.5.20-17.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828577" version="1" comment="squid-migration-script is &lt;3.5.20-17.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828578" version="1" comment="squid-sysvinit is &lt;3.5.20-17.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828579" version="1" comment="thunderbird is &lt;78.3.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828580" version="1" comment="spice-glib is &lt;0.35-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828581" version="1" comment="spice-glib-devel is &lt;0.35-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828582" version="1" comment="spice-gtk-tools is &lt;0.35-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828583" version="1" comment="spice-gtk3 is &lt;0.35-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828584" version="1" comment="spice-gtk3-devel is &lt;0.35-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828585" version="1" comment="spice-gtk3-vala is &lt;0.35-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828586" version="1" comment="spice-server is &lt;0.14.0-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828587" version="1" comment="spice-server-devel is &lt;0.14.0-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828588" version="1" comment="java-11-openjdk is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828589" version="1" comment="java-11-openjdk-demo is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828590" version="1" comment="java-11-openjdk-devel is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828591" version="1" comment="java-11-openjdk-headless is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828592" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828593" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828594" version="1" comment="java-11-openjdk-jmods is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828595" version="1" comment="java-11-openjdk-src is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828596" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.9.11-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828597" version="1" comment="firefox is &lt;78.4.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828598" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.272.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828599" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.272.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828600" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.272.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828601" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.272.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828602" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.272.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828603" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.272.b10-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828604" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.272.b10-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828605" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.272.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828606" version="1" comment="freetype is &lt;2.8-14.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828607" version="1" comment="freetype-demos is &lt;2.8-14.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828608" version="1" comment="freetype-devel is &lt;2.8-14.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828609" version="1" comment="libX11 is &lt;1.6.7-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828610" version="1" comment="libX11-common is &lt;1.6.7-3.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828611" version="1" comment="libX11-devel is &lt;1.6.7-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828612" version="1" comment="thunderbird is &lt;78.4.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828613" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828614" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828615" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828616" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828617" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828618" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828619" version="1" comment="xorg-x11-server-common is &lt;1.20.4-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828620" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-12.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828621" version="1" comment="xorg-x11-server-source is &lt;1.20.4-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828622" version="1" comment="curl is &lt;7.29.0-59.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828623" version="1" comment="libcurl is &lt;7.29.0-59.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828624" version="1" comment="libcurl-devel is &lt;7.29.0-59.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828625" version="1" comment="fence-agents-aliyun is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828626" version="1" comment="fence-agents-all is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828627" version="1" comment="fence-agents-amt-ws is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828628" version="1" comment="fence-agents-apc is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828629" version="1" comment="fence-agents-apc-snmp is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828630" version="1" comment="fence-agents-aws is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828631" version="1" comment="fence-agents-azure-arm is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828632" version="1" comment="fence-agents-bladecenter is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828633" version="1" comment="fence-agents-brocade is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828634" version="1" comment="fence-agents-cisco-mds is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828635" version="1" comment="fence-agents-cisco-ucs is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828636" version="1" comment="fence-agents-common is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828637" version="1" comment="fence-agents-compute is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828638" version="1" comment="fence-agents-drac5 is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828639" version="1" comment="fence-agents-eaton-snmp is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828640" version="1" comment="fence-agents-emerson is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828641" version="1" comment="fence-agents-eps is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828642" version="1" comment="fence-agents-gce is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828643" version="1" comment="fence-agents-heuristics-ping is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828644" version="1" comment="fence-agents-hpblade is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828645" version="1" comment="fence-agents-ibmblade is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828646" version="1" comment="fence-agents-ifmib is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828647" version="1" comment="fence-agents-ilo-moonshot is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828648" version="1" comment="fence-agents-ilo-mp is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828649" version="1" comment="fence-agents-ilo-ssh is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828650" version="1" comment="fence-agents-ilo2 is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828651" version="1" comment="fence-agents-intelmodular is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828652" version="1" comment="fence-agents-ipdu is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828653" version="1" comment="fence-agents-ipmilan is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828654" version="1" comment="fence-agents-kdump is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828655" version="1" comment="fence-agents-lpar is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828656" version="1" comment="fence-agents-mpath is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828657" version="1" comment="fence-agents-redfish is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828658" version="1" comment="fence-agents-rhevm is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828659" version="1" comment="fence-agents-rsa is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828660" version="1" comment="fence-agents-rsb is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828661" version="1" comment="fence-agents-sbd is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828662" version="1" comment="fence-agents-scsi is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828663" version="1" comment="fence-agents-virsh is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828664" version="1" comment="fence-agents-vmware-rest is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828665" version="1" comment="fence-agents-vmware-soap is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828666" version="1" comment="fence-agents-wti is &lt;4.2.1-41.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828667" version="1" comment="resource-agents is &lt;4.1.1-61.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828668" version="1" comment="resource-agents-aliyun is &lt;4.1.1-61.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828669" version="1" comment="python is &lt;2.7.5-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828670" version="1" comment="python-debug is &lt;2.7.5-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828671" version="1" comment="python-devel is &lt;2.7.5-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828672" version="1" comment="python-libs is &lt;2.7.5-90.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828673" version="1" comment="python-test is &lt;2.7.5-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828674" version="1" comment="python-tools is &lt;2.7.5-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828675" version="1" comment="tkinter is &lt;2.7.5-90.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828676" version="1" comment="python3 is &lt;3.6.8-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828677" version="1" comment="python3-debug is &lt;3.6.8-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828678" version="1" comment="python3-devel is &lt;3.6.8-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828679" version="1" comment="python3-idle is &lt;3.6.8-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828680" version="1" comment="python3-libs is &lt;3.6.8-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828681" version="1" comment="python3-test is &lt;3.6.8-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828682" version="1" comment="python3-tkinter is &lt;3.6.8-18.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828683" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828684" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828685" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828686" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828687" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828688" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828689" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828690" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828691" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828692" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828693" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828694" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828695" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828696" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828697" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828698" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828699" version="1" comment="librepo is &lt;1.8.1-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828700" version="1" comment="librepo-devel is &lt;1.8.1-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828701" version="1" comment="python-librepo is &lt;1.8.1-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828702" version="1" comment="tomcat is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828703" version="1" comment="tomcat-admin-webapps is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828704" version="1" comment="tomcat-docs-webapp is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828705" version="1" comment="tomcat-el-2.2-api is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828706" version="1" comment="tomcat-javadoc is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828707" version="1" comment="tomcat-jsp-2.2-api is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828708" version="1" comment="tomcat-jsvc is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828709" version="1" comment="tomcat-lib is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828710" version="1" comment="tomcat-servlet-3.0-api is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828711" version="1" comment="tomcat-webapps is &lt;7.0.76-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828712" version="1" comment="qt is &lt;4.8.7-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828713" version="1" comment="qt-assistant is &lt;4.8.7-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828714" version="1" comment="qt-config is &lt;4.8.7-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828715" version="1" comment="qt-demos is &lt;4.8.7-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828716" version="1" comment="qt-devel is &lt;4.8.7-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828717" version="1" comment="qt-devel-private is &lt;4.8.7-9.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828718" version="1" comment="qt-doc is &lt;4.8.7-9.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828719" version="1" comment="qt-examples is &lt;4.8.7-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828720" version="1" comment="qt-mysql is &lt;4.8.7-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828721" version="1" comment="qt-odbc is &lt;4.8.7-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828722" version="1" comment="qt-postgresql is &lt;4.8.7-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828723" version="1" comment="qt-qdbusviewer is &lt;4.8.7-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828724" version="1" comment="qt-qvfb is &lt;4.8.7-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828725" version="1" comment="qt-x11 is &lt;4.8.7-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828726" version="1" comment="qt5-qtbase is &lt;5.9.7-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828727" version="1" comment="qt5-qtbase-common is &lt;5.9.7-5.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828728" version="1" comment="qt5-qtbase-devel is &lt;5.9.7-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828729" version="1" comment="qt5-qtbase-doc is &lt;5.9.7-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828730" version="1" comment="qt5-qtbase-examples is &lt;5.9.7-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828731" version="1" comment="qt5-qtbase-gui is &lt;5.9.7-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828732" version="1" comment="qt5-qtbase-mysql is &lt;5.9.7-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828733" version="1" comment="qt5-qtbase-odbc is &lt;5.9.7-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828734" version="1" comment="qt5-qtbase-postgresql is &lt;5.9.7-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828735" version="1" comment="qt5-qtbase-static is &lt;5.9.7-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828736" version="1" comment="qt5-rpm-macros is &lt;5.9.7-5.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828737" version="1" comment="bpftool is &lt;3.10.0-1160.6.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828738" version="1" comment="kernel is &lt;3.10.0-1160.6.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828739" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.6.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828740" version="1" comment="kernel-debug is &lt;3.10.0-1160.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828743" version="1" comment="kernel-doc is &lt;3.10.0-1160.6.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828744" version="1" comment="kernel-headers is &lt;3.10.0-1160.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828745" version="1" comment="kernel-tools is &lt;3.10.0-1160.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828746" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.6.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828748" version="1" comment="perf is &lt;3.10.0-1160.6.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828749" version="1" comment="python-perf is &lt;3.10.0-1160.6.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828750" version="1" comment="libvirt is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828751" version="1" comment="libvirt-admin is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828752" version="1" comment="libvirt-bash-completion is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828753" version="1" comment="libvirt-client is &lt;4.5.0-36.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828754" version="1" comment="libvirt-daemon is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828755" version="1" comment="libvirt-daemon-config-network is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828756" version="1" comment="libvirt-daemon-config-nwfilter is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828757" version="1" comment="libvirt-daemon-driver-interface is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828758" version="1" comment="libvirt-daemon-driver-lxc is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828759" version="1" comment="libvirt-daemon-driver-network is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828760" version="1" comment="libvirt-daemon-driver-nodedev is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828761" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828762" version="1" comment="libvirt-daemon-driver-qemu is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828763" version="1" comment="libvirt-daemon-driver-secret is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828764" version="1" comment="libvirt-daemon-driver-storage is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828765" version="1" comment="libvirt-daemon-driver-storage-core is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828766" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828767" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828768" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828769" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828770" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828771" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828772" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828773" version="1" comment="libvirt-daemon-kvm is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828774" version="1" comment="libvirt-daemon-lxc is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828775" version="1" comment="libvirt-devel is &lt;4.5.0-36.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828776" version="1" comment="libvirt-docs is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828777" version="1" comment="libvirt-libs is &lt;4.5.0-36.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828778" version="1" comment="libvirt-lock-sanlock is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828779" version="1" comment="libvirt-login-shell is &lt;4.5.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828780" version="1" comment="libvirt-nss is &lt;4.5.0-36.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828781" version="1" comment="microcode_ctl is &lt;2.1-73.2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828782" version="1" comment="firefox is &lt;78.4.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828783" version="1" comment="thunderbird is &lt;78.4.3-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828784" version="1" comment="thunderbird is &lt;78.5.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828785" version="1" comment="firefox is &lt;78.5.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828786" version="1" comment="net-snmp is &lt;5.7.2-49.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828787" version="1" comment="net-snmp-agent-libs is &lt;5.7.2-49.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828788" version="1" comment="net-snmp-devel is &lt;5.7.2-49.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828789" version="1" comment="net-snmp-gui is &lt;5.7.2-49.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828790" version="1" comment="net-snmp-libs is &lt;5.7.2-49.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828791" version="1" comment="net-snmp-perl is &lt;5.7.2-49.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828792" version="1" comment="net-snmp-python is &lt;5.7.2-49.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828793" version="1" comment="net-snmp-sysvinit is &lt;5.7.2-49.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828794" version="1" comment="net-snmp-utils is &lt;5.7.2-49.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828795" version="1" comment="thunderbird is &lt;78.5.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828796" version="1" comment="libexif is &lt;0.6.22-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828797" version="1" comment="libexif-devel is &lt;0.6.22-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828798" version="1" comment="libexif-doc is &lt;0.6.22-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828799" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828800" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828801" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828802" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828803" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828804" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828805" version="1" comment="xorg-x11-server-common is &lt;1.20.4-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828806" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828807" version="1" comment="xorg-x11-server-source is &lt;1.20.4-15.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828808" version="1" comment="targetcli is &lt;2.1.53-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828809" version="1" comment="python-rtslib is &lt;2.1.74-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828810" version="1" comment="python-rtslib-doc is &lt;2.1.74-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828811" version="1" comment="bpftool is &lt;3.10.0-1160.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828812" version="1" comment="kernel is &lt;3.10.0-1160.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828813" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.11.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828814" version="1" comment="kernel-debug is &lt;3.10.0-1160.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828817" version="1" comment="kernel-doc is &lt;3.10.0-1160.11.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828818" version="1" comment="kernel-headers is &lt;3.10.0-1160.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828819" version="1" comment="kernel-tools is &lt;3.10.0-1160.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828820" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.11.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828822" version="1" comment="perf is &lt;3.10.0-1160.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828823" version="1" comment="python-perf is &lt;3.10.0-1160.11.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828824" version="1" comment="ctdb is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828825" version="1" comment="ctdb-tests is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828826" version="1" comment="libsmbclient is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828827" version="1" comment="libsmbclient-devel is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828828" version="1" comment="libwbclient is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828829" version="1" comment="libwbclient-devel is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828830" version="1" comment="samba is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828831" version="1" comment="samba-client is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828832" version="1" comment="samba-client-libs is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828833" version="1" comment="samba-common is &lt;4.10.16-9.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828834" version="1" comment="samba-common-libs is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828835" version="1" comment="samba-common-tools is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828836" version="1" comment="samba-dc is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828837" version="1" comment="samba-dc-libs is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828838" version="1" comment="samba-devel is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828839" version="1" comment="samba-krb5-printing is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828840" version="1" comment="samba-libs is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828841" version="1" comment="samba-pidl is &lt;4.10.16-9.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828842" version="1" comment="samba-python is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828843" version="1" comment="samba-python-test is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828844" version="1" comment="samba-test is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828845" version="1" comment="samba-test-libs is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828846" version="1" comment="samba-vfs-glusterfs is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828847" version="1" comment="samba-winbind is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828848" version="1" comment="samba-winbind-clients is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828849" version="1" comment="samba-winbind-krb5-locator is &lt;4.10.16-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828850" version="1" comment="samba-winbind-modules is &lt;4.10.16-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828851" version="1" comment="gd is &lt;2.0.35-27.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828852" version="1" comment="gd-devel is &lt;2.0.35-27.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828853" version="1" comment="gd-progs is &lt;2.0.35-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828854" version="1" comment="pacemaker is &lt;1.1.23-1.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828855" version="1" comment="pacemaker-cli is &lt;1.1.23-1.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828856" version="1" comment="pacemaker-cluster-libs is &lt;1.1.23-1.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828857" version="1" comment="pacemaker-cts is &lt;1.1.23-1.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828858" version="1" comment="pacemaker-doc is &lt;1.1.23-1.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828859" version="1" comment="pacemaker-libs is &lt;1.1.23-1.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828860" version="1" comment="pacemaker-libs-devel is &lt;1.1.23-1.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828861" version="1" comment="pacemaker-nagios-plugins-metadata is &lt;1.1.23-1.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828862" version="1" comment="pacemaker-remote is &lt;1.1.23-1.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828863" version="1" comment="firefox is &lt;78.6.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828864" version="1" comment="openssl is &lt;1.0.2k-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828865" version="1" comment="openssl-devel is &lt;1.0.2k-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828866" version="1" comment="openssl-libs is &lt;1.0.2k-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828867" version="1" comment="openssl-perl is &lt;1.0.2k-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828868" version="1" comment="openssl-static is &lt;1.0.2k-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828869" version="1" comment="thunderbird is &lt;78.6.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828870" version="1" comment="ImageMagick is &lt;6.9.10.68-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828871" version="1" comment="ImageMagick-c++ is &lt;6.9.10.68-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828872" version="1" comment="ImageMagick-c++-devel is &lt;6.9.10.68-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828873" version="1" comment="ImageMagick-devel is &lt;6.9.10.68-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828874" version="1" comment="ImageMagick-doc is &lt;6.9.10.68-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828875" version="1" comment="ImageMagick-perl is &lt;6.9.10.68-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828876" version="1" comment="firefox is &lt;78.6.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828877" version="1" comment="thunderbird is &lt;78.6.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828878" version="1" comment="dnsmasq is &lt;2.76-16.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828879" version="1" comment="dnsmasq-utils is &lt;2.76-16.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828880" version="1" comment="xstream is &lt;1.3.1-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828881" version="1" comment="xstream-javadoc is &lt;1.3.1-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828882" version="1" comment="sudo is &lt;1.8.23-10.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828883" version="1" comment="sudo-devel is &lt;1.8.23-10.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828884" version="1" comment="firefox is &lt;78.7.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828885" version="1" comment="thunderbird is &lt;78.7.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828886" version="1" comment="bpftool is &lt;3.10.0-1160.15.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828887" version="1" comment="kernel is &lt;3.10.0-1160.15.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828888" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.15.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828889" version="1" comment="kernel-debug is &lt;3.10.0-1160.15.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828892" version="1" comment="kernel-doc is &lt;3.10.0-1160.15.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828893" version="1" comment="kernel-headers is &lt;3.10.0-1160.15.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828894" version="1" comment="kernel-tools is &lt;3.10.0-1160.15.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828895" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.15.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828897" version="1" comment="perf is &lt;3.10.0-1160.15.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828898" version="1" comment="python-perf is &lt;3.10.0-1160.15.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828899" version="1" comment="iwl100-firmware is &lt;39.31.5.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828900" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828901" version="1" comment="iwl105-firmware is &lt;18.168.6.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828902" version="1" comment="iwl135-firmware is &lt;18.168.6.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828903" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828904" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828905" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828906" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828907" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828908" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828909" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828910" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828911" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828912" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828913" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828914" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-80.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828915" version="1" comment="linux-firmware is &lt;20200421-80.git78c0348.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828916" version="1" comment="perl is &lt;5.16.3-299.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828917" version="1" comment="perl-CPAN is &lt;1.9800-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828918" version="1" comment="perl-ExtUtils-CBuilder is &lt;0.28.2.6-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828919" version="1" comment="perl-ExtUtils-Embed is &lt;1.30-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828920" version="1" comment="perl-ExtUtils-Install is &lt;1.58-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828921" version="1" comment="perl-IO-Zlib is &lt;1.10-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828922" version="1" comment="perl-Locale-Maketext-Simple is &lt;0.21-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828923" version="1" comment="perl-Module-CoreList is &lt;2.76.02-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828924" version="1" comment="perl-Module-Loaded is &lt;0.08-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828925" version="1" comment="perl-Object-Accessor is &lt;0.42-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828926" version="1" comment="perl-Package-Constants is &lt;0.02-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828927" version="1" comment="perl-Pod-Escapes is &lt;1.04-299.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828928" version="1" comment="perl-Time-Piece is &lt;1.20.1-299.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828929" version="1" comment="perl-core is &lt;5.16.3-299.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828930" version="1" comment="perl-devel is &lt;5.16.3-299.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828931" version="1" comment="perl-libs is &lt;5.16.3-299.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828932" version="1" comment="perl-macros is &lt;5.16.3-299.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828933" version="1" comment="perl-tests is &lt;5.16.3-299.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828934" version="1" comment="qemu-img is &lt;1.5.3-175.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828935" version="1" comment="qemu-kvm is &lt;1.5.3-175.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828936" version="1" comment="qemu-kvm-common is &lt;1.5.3-175.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828937" version="1" comment="qemu-kvm-tools is &lt;1.5.3-175.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828938" version="1" comment="glibc is &lt;2.17-322.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828939" version="1" comment="glibc-common is &lt;2.17-322.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828940" version="1" comment="glibc-devel is &lt;2.17-322.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828941" version="1" comment="glibc-headers is &lt;2.17-322.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828942" version="1" comment="glibc-static is &lt;2.17-322.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828943" version="1" comment="glibc-utils is &lt;2.17-322.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828944" version="1" comment="nscd is &lt;2.17-322.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828945" version="1" comment="flatpak is &lt;1.0.9-10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828946" version="1" comment="flatpak-builder is &lt;1.0.0-10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828947" version="1" comment="flatpak-devel is &lt;1.0.9-10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828948" version="1" comment="flatpak-libs is &lt;1.0.9-10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828949" version="1" comment="xterm is &lt;295-3.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828950" version="1" comment="firefox is &lt;78.8.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828951" version="1" comment="thunderbird is &lt;78.8.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828952" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828953" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828954" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828955" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828956" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828957" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828958" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828959" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828960" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828961" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828962" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828963" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828964" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828965" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828966" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828967" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828968" version="1" comment="grub2 is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828969" version="1" comment="grub2-common is &lt;2.02-0.87.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828970" version="1" comment="grub2-efi-ia32 is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828971" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828972" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-0.87.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828973" version="1" comment="grub2-efi-x64 is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828974" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828975" version="1" comment="grub2-efi-x64-modules is &lt;2.02-0.87.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828976" version="1" comment="grub2-pc is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828977" version="1" comment="grub2-pc-modules is &lt;2.02-0.87.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828978" version="1" comment="grub2-tools is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828979" version="1" comment="grub2-tools-extra is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828980" version="1" comment="grub2-tools-minimal is &lt;2.02-0.87.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828981" version="1" comment="screen is &lt;4.1.0-0.27.20120314git3c2946.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828982" version="1" comment="wpa_supplicant is &lt;2.6-12.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828983" version="1" comment="pki-base is &lt;10.5.18-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828984" version="1" comment="pki-base-java is &lt;10.5.18-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828985" version="1" comment="pki-ca is &lt;10.5.18-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828986" version="1" comment="pki-javadoc is &lt;10.5.18-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828987" version="1" comment="pki-kra is &lt;10.5.18-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828988" version="1" comment="pki-server is &lt;10.5.18-12.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828989" version="1" comment="pki-symkey is &lt;10.5.18-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828990" version="1" comment="pki-tools is &lt;10.5.18-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828991" version="1" comment="bpftool is &lt;3.10.0-1160.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828992" version="1" comment="kernel is &lt;3.10.0-1160.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828993" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.21.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828994" version="1" comment="kernel-debug is &lt;3.10.0-1160.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828997" version="1" comment="kernel-doc is &lt;3.10.0-1160.21.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828998" version="1" comment="kernel-headers is &lt;3.10.0-1160.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009828999" version="1" comment="kernel-tools is &lt;3.10.0-1160.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829000" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.21.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829002" version="1" comment="perf is &lt;3.10.0-1160.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829003" version="1" comment="python-perf is &lt;3.10.0-1160.21.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829004" version="1" comment="ipa-client is &lt;4.6.8-5.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829005" version="1" comment="ipa-client-common is &lt;4.6.8-5.el7_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829006" version="1" comment="ipa-common is &lt;4.6.8-5.el7_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829007" version="1" comment="ipa-python-compat is &lt;4.6.8-5.el7_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829008" version="1" comment="ipa-server is &lt;4.6.8-5.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829009" version="1" comment="ipa-server-common is &lt;4.6.8-5.el7_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829010" version="1" comment="ipa-server-dns is &lt;4.6.8-5.el7_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829011" version="1" comment="ipa-server-trust-ad is &lt;4.6.8-5.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829012" version="1" comment="python2-ipaclient is &lt;4.6.8-5.el7_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829013" version="1" comment="python2-ipalib is &lt;4.6.8-5.el7_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829014" version="1" comment="python2-ipaserver is &lt;4.6.8-5.el7_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829015" version="1" comment="firefox is &lt;78.9.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829016" version="1" comment="thunderbird is &lt;78.9.0-3.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829017" version="1" comment="flatpak is &lt;1.0.9-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829018" version="1" comment="flatpak-builder is &lt;1.0.0-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829019" version="1" comment="flatpak-devel is &lt;1.0.9-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829020" version="1" comment="flatpak-libs is &lt;1.0.9-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829021" version="1" comment="bpftool is &lt;3.10.0-1160.24.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829022" version="1" comment="kernel is &lt;3.10.0-1160.24.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829023" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.24.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829024" version="1" comment="kernel-debug is &lt;3.10.0-1160.24.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829027" version="1" comment="kernel-doc is &lt;3.10.0-1160.24.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829028" version="1" comment="kernel-headers is &lt;3.10.0-1160.24.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829029" version="1" comment="kernel-tools is &lt;3.10.0-1160.24.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829030" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.24.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829032" version="1" comment="perf is &lt;3.10.0-1160.24.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829033" version="1" comment="python-perf is &lt;3.10.0-1160.24.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829034" version="1" comment="ldb-tools is &lt;1.5.4-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829035" version="1" comment="libldb is &lt;1.5.4-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829036" version="1" comment="libldb-devel is &lt;1.5.4-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829037" version="1" comment="pyldb is &lt;1.5.4-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829038" version="1" comment="pyldb-devel is &lt;1.5.4-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829039" version="1" comment="squid is &lt;3.5.20-17.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829040" version="1" comment="squid-migration-script is &lt;3.5.20-17.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829041" version="1" comment="squid-sysvinit is &lt;3.5.20-17.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829042" version="1" comment="nettle is &lt;2.7.1-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829043" version="1" comment="nettle-devel is &lt;2.7.1-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829044" version="1" comment="thunderbird is &lt;78.9.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829045" version="1" comment="java-11-openjdk is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829046" version="1" comment="java-11-openjdk-demo is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829047" version="1" comment="java-11-openjdk-devel is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829048" version="1" comment="java-11-openjdk-headless is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829049" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829050" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829051" version="1" comment="java-11-openjdk-jmods is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829052" version="1" comment="java-11-openjdk-src is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829053" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.11.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829054" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.292.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829055" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.292.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829056" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.292.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829057" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.292.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829058" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.292.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829059" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.292.b10-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829060" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.292.b10-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829061" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.292.b10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829062" version="1" comment="thunderbird is &lt;78.10.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829063" version="1" comment="xstream is &lt;1.3.1-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829064" version="1" comment="xstream-javadoc is &lt;1.3.1-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829065" version="1" comment="firefox is &lt;78.10.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829066" version="1" comment="nss is &lt;3.53.1-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829067" version="1" comment="nss-devel is &lt;3.53.1-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829068" version="1" comment="nss-pkcs11-devel is &lt;3.53.1-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829069" version="1" comment="nss-sysinit is &lt;3.53.1-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829070" version="1" comment="nss-tools is &lt;3.53.1-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829071" version="1" comment="openldap is &lt;2.4.44-23.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829072" version="1" comment="openldap-clients is &lt;2.4.44-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829073" version="1" comment="openldap-devel is &lt;2.4.44-23.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829074" version="1" comment="openldap-servers is &lt;2.4.44-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829075" version="1" comment="openldap-servers-sql is &lt;2.4.44-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829076" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829077" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829078" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829079" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829080" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829081" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829082" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829083" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829084" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829085" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829086" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829087" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829088" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829089" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829090" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829091" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829092" version="1" comment="postgresql is &lt;9.2.24-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829093" version="1" comment="postgresql-contrib is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829094" version="1" comment="postgresql-devel is &lt;9.2.24-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829095" version="1" comment="postgresql-docs is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829096" version="1" comment="postgresql-libs is &lt;9.2.24-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829097" version="1" comment="postgresql-plperl is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829098" version="1" comment="postgresql-plpython is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829099" version="1" comment="postgresql-pltcl is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829100" version="1" comment="postgresql-server is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829101" version="1" comment="postgresql-static is &lt;9.2.24-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829102" version="1" comment="postgresql-test is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829103" version="1" comment="postgresql-upgrade is &lt;9.2.24-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829104" version="1" comment="slapi-nis is &lt;0.56.5-4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829105" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829106" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829107" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829108" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829109" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829110" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829111" version="1" comment="xorg-x11-server-common is &lt;1.20.4-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829112" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-16.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829113" version="1" comment="xorg-x11-server-source is &lt;1.20.4-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829114" version="1" comment="glib2 is &lt;2.56.1-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829115" version="1" comment="glib2-devel is &lt;2.56.1-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829116" version="1" comment="glib2-doc is &lt;2.56.1-9.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829117" version="1" comment="glib2-fam is &lt;2.56.1-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829118" version="1" comment="glib2-static is &lt;2.56.1-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829119" version="1" comment="glib2-tests is &lt;2.56.1-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829120" version="1" comment="firefox is &lt;78.11.0-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829121" version="1" comment="libwebp is &lt;0.3.0-10.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829122" version="1" comment="libwebp-devel is &lt;0.3.0-10.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829123" version="1" comment="libwebp-java is &lt;0.3.0-10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829124" version="1" comment="libwebp-tools is &lt;0.3.0-10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829125" version="1" comment="thunderbird is &lt;78.11.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829126" version="1" comment="microcode_ctl is &lt;2.1-73.9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829127" version="1" comment="ctdb is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829128" version="1" comment="ctdb-tests is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829129" version="1" comment="libsmbclient is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829130" version="1" comment="libsmbclient-devel is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829131" version="1" comment="libwbclient is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829132" version="1" comment="libwbclient-devel is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829133" version="1" comment="samba is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829134" version="1" comment="samba-client is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829135" version="1" comment="samba-client-libs is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829136" version="1" comment="samba-common is &lt;4.10.16-15.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829137" version="1" comment="samba-common-libs is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829138" version="1" comment="samba-common-tools is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829139" version="1" comment="samba-dc is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829140" version="1" comment="samba-dc-libs is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829141" version="1" comment="samba-devel is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829142" version="1" comment="samba-krb5-printing is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829143" version="1" comment="samba-libs is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829144" version="1" comment="samba-pidl is &lt;4.10.16-15.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829145" version="1" comment="samba-python is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829146" version="1" comment="samba-python-test is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829147" version="1" comment="samba-test is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829148" version="1" comment="samba-test-libs is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829149" version="1" comment="samba-vfs-glusterfs is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829150" version="1" comment="samba-winbind is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829151" version="1" comment="samba-winbind-clients is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829152" version="1" comment="samba-winbind-krb5-locator is &lt;4.10.16-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829153" version="1" comment="samba-winbind-modules is &lt;4.10.16-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829154" version="1" comment="bpftool is &lt;3.10.0-1160.31.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829155" version="1" comment="kernel is &lt;3.10.0-1160.31.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829156" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.31.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829157" version="1" comment="kernel-debug is &lt;3.10.0-1160.31.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829160" version="1" comment="kernel-doc is &lt;3.10.0-1160.31.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829161" version="1" comment="kernel-headers is &lt;3.10.0-1160.31.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829162" version="1" comment="kernel-tools is &lt;3.10.0-1160.31.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829163" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.31.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829165" version="1" comment="perf is &lt;3.10.0-1160.31.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829166" version="1" comment="python-perf is &lt;3.10.0-1160.31.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829167" version="1" comment="hivex is &lt;1.3.10-6.11.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829168" version="1" comment="hivex-devel is &lt;1.3.10-6.11.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829169" version="1" comment="ocaml-hivex is &lt;1.3.10-6.11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829170" version="1" comment="ocaml-hivex-devel is &lt;1.3.10-6.11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829171" version="1" comment="perl-hivex is &lt;1.3.10-6.11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829172" version="1" comment="python-hivex is &lt;1.3.10-6.11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829173" version="1" comment="ruby-hivex is &lt;1.3.10-6.11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829174" version="1" comment="qemu-img is &lt;1.5.3-175.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829175" version="1" comment="qemu-kvm is &lt;1.5.3-175.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829176" version="1" comment="qemu-kvm-common is &lt;1.5.3-175.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829177" version="1" comment="qemu-kvm-tools is &lt;1.5.3-175.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829178" version="1" comment="389-ds-base is &lt;1.3.10.2-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829179" version="1" comment="389-ds-base-devel is &lt;1.3.10.2-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829180" version="1" comment="389-ds-base-libs is &lt;1.3.10.2-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829181" version="1" comment="389-ds-base-snmp is &lt;1.3.10.2-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829182" version="1" comment="qt5-qtimageformats is &lt;5.9.7-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829183" version="1" comment="qt5-qtimageformats-doc is &lt;5.9.7-2.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829184" version="1" comment="dhclient is &lt;4.2.5-83.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829185" version="1" comment="dhcp is &lt;4.2.5-83.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829186" version="1" comment="dhcp-common is &lt;4.2.5-83.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829187" version="1" comment="dhcp-devel is &lt;4.2.5-83.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829188" version="1" comment="dhcp-libs is &lt;4.2.5-83.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829189" version="1" comment="postgresql is &lt;9.2.24-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829190" version="1" comment="postgresql-contrib is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829191" version="1" comment="postgresql-devel is &lt;9.2.24-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829192" version="1" comment="postgresql-docs is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829193" version="1" comment="postgresql-libs is &lt;9.2.24-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829194" version="1" comment="postgresql-plperl is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829195" version="1" comment="postgresql-plpython is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829196" version="1" comment="postgresql-pltcl is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829197" version="1" comment="postgresql-server is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829198" version="1" comment="postgresql-static is &lt;9.2.24-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829199" version="1" comment="postgresql-test is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829200" version="1" comment="postgresql-upgrade is &lt;9.2.24-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829201" version="1" comment="gupnp is &lt;1.0.2-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829202" version="1" comment="gupnp-devel is &lt;1.0.2-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829203" version="1" comment="gupnp-docs is &lt;1.0.2-6.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829204" version="1" comment="linuxptp is &lt;2.0-2.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829205" version="1" comment="xstream is &lt;1.3.1-14.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829206" version="1" comment="xstream-javadoc is &lt;1.3.1-14.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829207" version="1" comment="bpftool is &lt;3.10.0-1160.36.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829208" version="1" comment="kernel is &lt;3.10.0-1160.36.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829209" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.36.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829210" version="1" comment="kernel-debug is &lt;3.10.0-1160.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829213" version="1" comment="kernel-doc is &lt;3.10.0-1160.36.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829214" version="1" comment="kernel-headers is &lt;3.10.0-1160.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829215" version="1" comment="kernel-tools is &lt;3.10.0-1160.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829216" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.36.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829218" version="1" comment="perf is &lt;3.10.0-1160.36.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829219" version="1" comment="python-perf is &lt;3.10.0-1160.36.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829220" version="1" comment="firefox is &lt;78.12.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829221" version="1" comment="java-11-openjdk is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829222" version="1" comment="java-11-openjdk-demo is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829223" version="1" comment="java-11-openjdk-devel is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829224" version="1" comment="java-11-openjdk-headless is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829225" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829226" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829227" version="1" comment="java-11-openjdk-jmods is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829228" version="1" comment="java-11-openjdk-src is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829229" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.12.0.7-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829230" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.302.b08-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829231" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.302.b08-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829232" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.302.b08-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829233" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.302.b08-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829234" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.302.b08-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829235" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.302.b08-0.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829236" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.302.b08-0.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829237" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.302.b08-0.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829238" version="1" comment="thunderbird is &lt;78.12.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829239" version="1" comment="lasso is &lt;2.5.1-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829240" version="1" comment="lasso-devel is &lt;2.5.1-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829241" version="1" comment="lasso-python is &lt;2.5.1-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829242" version="1" comment="microcode_ctl is &lt;2.1-73.11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829243" version="1" comment="firefox is &lt;78.13.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829244" version="1" comment="exiv2 is &lt;0.27.0-4.el7_8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829245" version="1" comment="exiv2-devel is &lt;0.27.0-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829246" version="1" comment="exiv2-doc is &lt;0.27.0-4.el7_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829247" version="1" comment="exiv2-libs is &lt;0.27.0-4.el7_8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829248" version="1" comment="thunderbird is &lt;78.13.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829249" version="1" comment="compat-exiv2-026 is &lt;0.26-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829250" version="1" comment="compat-exiv2-023 is &lt;0.23-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829251" version="1" comment="libsndfile is &lt;1.0.25-12.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829252" version="1" comment="libsndfile-devel is &lt;1.0.25-12.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829253" version="1" comment="libsndfile-utils is &lt;1.0.25-12.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829254" version="1" comment="libX11 is &lt;1.6.7-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829255" version="1" comment="libX11-common is &lt;1.6.7-4.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829256" version="1" comment="libX11-devel is &lt;1.6.7-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829257" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829258" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829259" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829260" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829261" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829262" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829263" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829264" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829265" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829266" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829267" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829268" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829269" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829270" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829271" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829272" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829273" version="1" comment="bpftool is &lt;3.10.0-1160.41.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829274" version="1" comment="kernel is &lt;3.10.0-1160.41.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829275" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.41.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829276" version="1" comment="kernel-debug is &lt;3.10.0-1160.41.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829279" version="1" comment="kernel-doc is &lt;3.10.0-1160.41.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829280" version="1" comment="kernel-headers is &lt;3.10.0-1160.41.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829281" version="1" comment="kernel-tools is &lt;3.10.0-1160.41.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829282" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.41.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829284" version="1" comment="perf is &lt;3.10.0-1160.41.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829285" version="1" comment="python-perf is &lt;3.10.0-1160.41.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829286" version="1" comment="libipa_hbac is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829287" version="1" comment="libipa_hbac-devel is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829288" version="1" comment="libsss_autofs is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829289" version="1" comment="libsss_certmap is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829290" version="1" comment="libsss_certmap-devel is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829291" version="1" comment="libsss_idmap is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829292" version="1" comment="libsss_idmap-devel is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829293" version="1" comment="libsss_nss_idmap is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829294" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829295" version="1" comment="libsss_simpleifp is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829296" version="1" comment="libsss_simpleifp-devel is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829297" version="1" comment="libsss_sudo is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829298" version="1" comment="python-libipa_hbac is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829299" version="1" comment="python-libsss_nss_idmap is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829300" version="1" comment="python-sss is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829301" version="1" comment="python-sss-murmur is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829302" version="1" comment="python-sssdconfig is &lt;1.16.5-10.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829303" version="1" comment="sssd is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829304" version="1" comment="sssd-ad is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829305" version="1" comment="sssd-client is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829306" version="1" comment="sssd-common is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829307" version="1" comment="sssd-common-pac is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829308" version="1" comment="sssd-dbus is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829309" version="1" comment="sssd-ipa is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829310" version="1" comment="sssd-kcm is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829311" version="1" comment="sssd-krb5 is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829312" version="1" comment="sssd-krb5-common is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829313" version="1" comment="sssd-ldap is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829314" version="1" comment="sssd-libwbclient is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829315" version="1" comment="sssd-libwbclient-devel is &lt;1.16.5-10.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829316" version="1" comment="sssd-polkit-rules is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829317" version="1" comment="sssd-proxy is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829318" version="1" comment="sssd-tools is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829319" version="1" comment="sssd-winbind-idmap is &lt;1.16.5-10.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829320" version="1" comment="hivex is &lt;1.3.10-6.12.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829321" version="1" comment="hivex-devel is &lt;1.3.10-6.12.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829322" version="1" comment="ocaml-hivex is &lt;1.3.10-6.12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829323" version="1" comment="ocaml-hivex-devel is &lt;1.3.10-6.12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829324" version="1" comment="perl-hivex is &lt;1.3.10-6.12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829325" version="1" comment="python-hivex is &lt;1.3.10-6.12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829326" version="1" comment="ruby-hivex is &lt;1.3.10-6.12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829327" version="1" comment="bpftool is &lt;3.10.0-1160.42.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829328" version="1" comment="kernel is &lt;3.10.0-1160.42.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829329" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.42.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829330" version="1" comment="kernel-debug is &lt;3.10.0-1160.42.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829333" version="1" comment="kernel-doc is &lt;3.10.0-1160.42.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829334" version="1" comment="kernel-headers is &lt;3.10.0-1160.42.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829335" version="1" comment="kernel-tools is &lt;3.10.0-1160.42.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829336" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.42.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829338" version="1" comment="perf is &lt;3.10.0-1160.42.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829339" version="1" comment="python-perf is &lt;3.10.0-1160.42.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829340" version="1" comment="thunderbird is &lt;78.14.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829341" version="1" comment="firefox is &lt;78.14.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829342" version="1" comment="firefox is &lt;91.2.0-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829343" version="1" comment="openssl is &lt;1.0.2k-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829344" version="1" comment="openssl-devel is &lt;1.0.2k-22.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829345" version="1" comment="openssl-libs is &lt;1.0.2k-22.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829346" version="1" comment="openssl-perl is &lt;1.0.2k-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829347" version="1" comment="openssl-static is &lt;1.0.2k-22.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829348" version="1" comment="bpftool is &lt;3.10.0-1160.45.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829349" version="1" comment="kernel is &lt;3.10.0-1160.45.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829350" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.45.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829351" version="1" comment="kernel-debug is &lt;3.10.0-1160.45.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829354" version="1" comment="kernel-doc is &lt;3.10.0-1160.45.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829355" version="1" comment="kernel-headers is &lt;3.10.0-1160.45.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829356" version="1" comment="kernel-tools is &lt;3.10.0-1160.45.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829357" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.45.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829359" version="1" comment="perf is &lt;3.10.0-1160.45.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829360" version="1" comment="python-perf is &lt;3.10.0-1160.45.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829361" version="1" comment="389-ds-base is &lt;1.3.10.2-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829362" version="1" comment="389-ds-base-devel is &lt;1.3.10.2-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829363" version="1" comment="389-ds-base-libs is &lt;1.3.10.2-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829364" version="1" comment="389-ds-base-snmp is &lt;1.3.10.2-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829365" version="1" comment="libxml2 is &lt;2.9.1-6.el7_9.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829366" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7_9.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829367" version="1" comment="libxml2-python is &lt;2.9.1-6.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829368" version="1" comment="libxml2-static is &lt;2.9.1-6.el7_9.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829369" version="1" comment="thunderbird is &lt;91.2.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829370" version="1" comment="httpd is &lt;2.4.6-97.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829371" version="1" comment="httpd-devel is &lt;2.4.6-97.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829372" version="1" comment="httpd-manual is &lt;2.4.6-97.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829373" version="1" comment="httpd-tools is &lt;2.4.6-97.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829374" version="1" comment="mod_ldap is &lt;2.4.6-97.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829375" version="1" comment="mod_proxy_html is &lt;2.4.6-97.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829376" version="1" comment="mod_session is &lt;2.4.6-97.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829377" version="1" comment="mod_ssl is &lt;2.4.6-97.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829378" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.312.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829379" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.312.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829380" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.312.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829381" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.312.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829382" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.312.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829383" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.312.b07-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829384" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.312.b07-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829385" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.312.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829386" version="1" comment="java-11-openjdk is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829387" version="1" comment="java-11-openjdk-demo is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829388" version="1" comment="java-11-openjdk-devel is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829389" version="1" comment="java-11-openjdk-headless is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829390" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829391" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829392" version="1" comment="java-11-openjdk-jmods is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829393" version="1" comment="java-11-openjdk-src is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829394" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.13.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829395" version="1" comment="xstream is &lt;1.3.1-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829396" version="1" comment="xstream-javadoc is &lt;1.3.1-16.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829397" version="1" comment="binutils is &lt;2.27-44.base.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829398" version="1" comment="binutils-devel is &lt;2.27-44.base.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829399" version="1" comment="flatpak is &lt;1.0.9-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829400" version="1" comment="flatpak-builder is &lt;1.0.0-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829401" version="1" comment="flatpak-devel is &lt;1.0.9-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829402" version="1" comment="flatpak-libs is &lt;1.0.9-12.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829403" version="1" comment="firefox is &lt;91.3.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829404" version="1" comment="thunderbird is &lt;91.3.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829405" version="1" comment="freerdp is &lt;2.1.1-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829406" version="1" comment="freerdp-devel is &lt;2.1.1-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829407" version="1" comment="freerdp-libs is &lt;2.1.1-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829408" version="1" comment="libwinpr is &lt;2.1.1-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829409" version="1" comment="libwinpr-devel is &lt;2.1.1-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829410" version="1" comment="bpftool is &lt;3.10.0-1160.49.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829411" version="1" comment="kernel is &lt;3.10.0-1160.49.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829412" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.49.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829413" version="1" comment="kernel-debug is &lt;3.10.0-1160.49.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829416" version="1" comment="kernel-doc is &lt;3.10.0-1160.49.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829417" version="1" comment="kernel-headers is &lt;3.10.0-1160.49.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829418" version="1" comment="kernel-tools is &lt;3.10.0-1160.49.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829419" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.49.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829421" version="1" comment="perf is &lt;3.10.0-1160.49.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829422" version="1" comment="python-perf is &lt;3.10.0-1160.49.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829423" version="1" comment="openssh is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829424" version="1" comment="openssh-askpass is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829425" version="1" comment="openssh-cavs is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829426" version="1" comment="openssh-clients is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829427" version="1" comment="openssh-keycat is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829428" version="1" comment="openssh-ldap is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829429" version="1" comment="openssh-server is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829430" version="1" comment="openssh-server-sysvinit is &lt;7.4p1-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829431" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-2.22.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829432" version="1" comment="rpm is &lt;4.11.3-48.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829433" version="1" comment="rpm-apidocs is &lt;4.11.3-48.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829434" version="1" comment="rpm-build is &lt;4.11.3-48.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829435" version="1" comment="rpm-build-libs is &lt;4.11.3-48.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829436" version="1" comment="rpm-cron is &lt;4.11.3-48.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829437" version="1" comment="rpm-devel is &lt;4.11.3-48.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829438" version="1" comment="rpm-libs is &lt;4.11.3-48.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829439" version="1" comment="rpm-plugin-systemd-inhibit is &lt;4.11.3-48.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829440" version="1" comment="rpm-python is &lt;4.11.3-48.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829441" version="1" comment="rpm-sign is &lt;4.11.3-48.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829442" version="1" comment="krb5-devel is &lt;1.15.1-51.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829443" version="1" comment="krb5-libs is &lt;1.15.1-51.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829444" version="1" comment="krb5-pkinit is &lt;1.15.1-51.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829445" version="1" comment="krb5-server is &lt;1.15.1-51.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829446" version="1" comment="krb5-server-ldap is &lt;1.15.1-51.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829447" version="1" comment="krb5-workstation is &lt;1.15.1-51.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829448" version="1" comment="libkadm5 is &lt;1.15.1-51.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829449" version="1" comment="nss is &lt;3.67.0-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829450" version="1" comment="nss-devel is &lt;3.67.0-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829451" version="1" comment="nss-pkcs11-devel is &lt;3.67.0-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829452" version="1" comment="nss-sysinit is &lt;3.67.0-4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829453" version="1" comment="nss-tools is &lt;3.67.0-4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829454" version="1" comment="mailman is &lt;2.1.15-30.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829455" version="1" comment="firefox is &lt;91.4.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829456" version="1" comment="thunderbird is &lt;91.4.0-3.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829457" version="1" comment="ctdb is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829458" version="1" comment="ctdb-tests is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829459" version="1" comment="libsmbclient is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829460" version="1" comment="libsmbclient-devel is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829461" version="1" comment="libwbclient is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829462" version="1" comment="libwbclient-devel is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829463" version="1" comment="samba is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829464" version="1" comment="samba-client is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829465" version="1" comment="samba-client-libs is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829466" version="1" comment="samba-common is &lt;4.10.16-17.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829467" version="1" comment="samba-common-libs is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829468" version="1" comment="samba-common-tools is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829469" version="1" comment="samba-dc is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829470" version="1" comment="samba-dc-libs is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829471" version="1" comment="samba-devel is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829472" version="1" comment="samba-krb5-printing is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829473" version="1" comment="samba-libs is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829474" version="1" comment="samba-pidl is &lt;4.10.16-17.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829475" version="1" comment="samba-python is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829476" version="1" comment="samba-python-test is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829477" version="1" comment="samba-test is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829478" version="1" comment="samba-test-libs is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829479" version="1" comment="samba-vfs-glusterfs is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829480" version="1" comment="samba-winbind is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829481" version="1" comment="samba-winbind-clients is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829482" version="1" comment="samba-winbind-krb5-locator is &lt;4.10.16-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829483" version="1" comment="samba-winbind-modules is &lt;4.10.16-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829484" version="1" comment="ipa-client is &lt;4.6.8-5.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829485" version="1" comment="ipa-client-common is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829486" version="1" comment="ipa-common is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829487" version="1" comment="ipa-python-compat is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829488" version="1" comment="ipa-server is &lt;4.6.8-5.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829489" version="1" comment="ipa-server-common is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829490" version="1" comment="ipa-server-dns is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829491" version="1" comment="ipa-server-trust-ad is &lt;4.6.8-5.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829492" version="1" comment="python2-ipaclient is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829493" version="1" comment="python2-ipalib is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829494" version="1" comment="python2-ipaserver is &lt;4.6.8-5.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829495" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829496" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829497" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829498" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829499" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829500" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829501" version="1" comment="xorg-x11-server-common is &lt;1.20.4-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829502" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-17.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829503" version="1" comment="xorg-x11-server-source is &lt;1.20.4-17.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829504" version="1" comment="webkitgtk4 is &lt;2.28.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829505" version="1" comment="webkitgtk4-devel is &lt;2.28.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829506" version="1" comment="webkitgtk4-doc is &lt;2.28.2-3.el7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829507" version="1" comment="webkitgtk4-jsc is &lt;2.28.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829508" version="1" comment="webkitgtk4-jsc-devel is &lt;2.28.2-3.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829509" version="1" comment="bpftool is &lt;3.10.0-1160.53.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829510" version="1" comment="kernel is &lt;3.10.0-1160.53.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829511" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.53.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829512" version="1" comment="kernel-debug is &lt;3.10.0-1160.53.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829515" version="1" comment="kernel-doc is &lt;3.10.0-1160.53.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829516" version="1" comment="kernel-headers is &lt;3.10.0-1160.53.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829517" version="1" comment="kernel-tools is &lt;3.10.0-1160.53.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829518" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.53.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829520" version="1" comment="perf is &lt;3.10.0-1160.53.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829521" version="1" comment="python-perf is &lt;3.10.0-1160.53.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829522" version="1" comment="openssl is &lt;1.0.2k-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829523" version="1" comment="openssl-devel is &lt;1.0.2k-23.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829524" version="1" comment="openssl-libs is &lt;1.0.2k-23.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829525" version="1" comment="openssl-perl is &lt;1.0.2k-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829526" version="1" comment="openssl-static is &lt;1.0.2k-23.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829527" version="1" comment="firefox is &lt;91.5.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829528" version="1" comment="thunderbird is &lt;91.5.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829529" version="1" comment="httpd is &lt;2.4.6-97.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829530" version="1" comment="httpd-devel is &lt;2.4.6-97.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829531" version="1" comment="httpd-manual is &lt;2.4.6-97.el7_9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829532" version="1" comment="httpd-tools is &lt;2.4.6-97.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829533" version="1" comment="mod_ldap is &lt;2.4.6-97.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829534" version="1" comment="mod_proxy_html is &lt;2.4.6-97.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829535" version="1" comment="mod_session is &lt;2.4.6-97.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829536" version="1" comment="mod_ssl is &lt;2.4.6-97.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829537" version="1" comment="gegl is &lt;0.2.0-19.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829538" version="1" comment="gegl-devel is &lt;0.2.0-19.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829539" version="1" comment="java-11-openjdk is &lt;11.0.14.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829540" version="1" comment="java-11-openjdk-devel is &lt;11.0.14.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829541" version="1" comment="java-11-openjdk-headless is &lt;11.0.14.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829542" version="1" comment="polkit is &lt;0.112-26.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829543" version="1" comment="polkit-devel is &lt;0.112-26.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829544" version="1" comment="polkit-docs is &lt;0.112-26.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829545" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.322.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829546" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.322.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829547" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.322.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829548" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.322.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829549" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.322.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829550" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.322.b06-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829551" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.322.b06-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829552" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.322.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829553" version="1" comment="ctdb is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829554" version="1" comment="ctdb-tests is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829555" version="1" comment="libsmbclient is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829556" version="1" comment="libsmbclient-devel is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829557" version="1" comment="libwbclient is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829558" version="1" comment="libwbclient-devel is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829559" version="1" comment="samba is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829560" version="1" comment="samba-client is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829561" version="1" comment="samba-client-libs is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829562" version="1" comment="samba-common is &lt;4.10.16-18.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829563" version="1" comment="samba-common-libs is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829564" version="1" comment="samba-common-tools is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829565" version="1" comment="samba-dc is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829566" version="1" comment="samba-dc-libs is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829567" version="1" comment="samba-devel is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829568" version="1" comment="samba-krb5-printing is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829569" version="1" comment="samba-libs is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829570" version="1" comment="samba-pidl is &lt;4.10.16-18.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829571" version="1" comment="samba-python is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829572" version="1" comment="samba-python-test is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829573" version="1" comment="samba-test is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829574" version="1" comment="samba-test-libs is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829575" version="1" comment="samba-vfs-glusterfs is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829576" version="1" comment="samba-winbind is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829577" version="1" comment="samba-winbind-clients is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829578" version="1" comment="samba-winbind-krb5-locator is &lt;4.10.16-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829579" version="1" comment="samba-winbind-modules is &lt;4.10.16-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829580" version="1" comment="aide is &lt;0.15.1-13.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829581" version="1" comment="firefox is &lt;91.6.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829582" version="1" comment="thunderbird is &lt;91.6.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829583" version="1" comment="python-pillow is &lt;2.0.0-23.gitd1c6db8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829584" version="1" comment="python-pillow-devel is &lt;2.0.0-23.gitd1c6db8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829585" version="1" comment="python-pillow-doc is &lt;2.0.0-23.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829586" version="1" comment="python-pillow-qt is &lt;2.0.0-23.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829587" version="1" comment="python-pillow-sane is &lt;2.0.0-23.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829588" version="1" comment="python-pillow-tk is &lt;2.0.0-23.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829589" version="1" comment="bpftool is &lt;3.10.0-1160.59.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829590" version="1" comment="kernel is &lt;3.10.0-1160.59.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829591" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.59.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829592" version="1" comment="kernel-debug is &lt;3.10.0-1160.59.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829595" version="1" comment="kernel-doc is &lt;3.10.0-1160.59.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829596" version="1" comment="kernel-headers is &lt;3.10.0-1160.59.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829597" version="1" comment="kernel-tools is &lt;3.10.0-1160.59.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829598" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.59.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829600" version="1" comment="perf is &lt;3.10.0-1160.59.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829601" version="1" comment="python-perf is &lt;3.10.0-1160.59.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829602" version="1" comment="openldap is &lt;2.4.44-25.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829603" version="1" comment="openldap-clients is &lt;2.4.44-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829604" version="1" comment="openldap-devel is &lt;2.4.44-25.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829605" version="1" comment="openldap-servers is &lt;2.4.44-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829606" version="1" comment="openldap-servers-sql is &lt;2.4.44-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829607" version="1" comment="389-ds-base is &lt;1.3.10.2-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829608" version="1" comment="389-ds-base-devel is &lt;1.3.10.2-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829609" version="1" comment="389-ds-base-libs is &lt;1.3.10.2-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829610" version="1" comment="389-ds-base-snmp is &lt;1.3.10.2-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829611" version="1" comment="cyrus-sasl is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829612" version="1" comment="cyrus-sasl-devel is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829613" version="1" comment="cyrus-sasl-gs2 is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829614" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829615" version="1" comment="cyrus-sasl-ldap is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829616" version="1" comment="cyrus-sasl-lib is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829617" version="1" comment="cyrus-sasl-md5 is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829618" version="1" comment="cyrus-sasl-ntlm is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829619" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829620" version="1" comment="cyrus-sasl-scram is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829621" version="1" comment="cyrus-sasl-sql is &lt;2.1.26-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829622" version="1" comment="firefox is &lt;91.7.0-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829623" version="1" comment="thunderbird is &lt;91.7.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829624" version="1" comment="httpd is &lt;2.4.6-97.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829625" version="1" comment="httpd-devel is &lt;2.4.6-97.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829626" version="1" comment="httpd-manual is &lt;2.4.6-97.el7_9.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829627" version="1" comment="httpd-tools is &lt;2.4.6-97.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829628" version="1" comment="mod_ldap is &lt;2.4.6-97.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829629" version="1" comment="mod_proxy_html is &lt;2.4.6-97.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829630" version="1" comment="mod_session is &lt;2.4.6-97.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829631" version="1" comment="mod_ssl is &lt;2.4.6-97.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829632" version="1" comment="openssl is &lt;1.0.2k-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829633" version="1" comment="openssl-devel is &lt;1.0.2k-25.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829634" version="1" comment="openssl-libs is &lt;1.0.2k-25.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829635" version="1" comment="expat is &lt;2.1.0-14.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829636" version="1" comment="expat-devel is &lt;2.1.0-14.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829637" version="1" comment="expat-static is &lt;2.1.0-14.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829638" version="1" comment="bpftool is &lt;3.10.0-1160.62.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829639" version="1" comment="kernel is &lt;3.10.0-1160.62.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829640" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.62.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829641" version="1" comment="kernel-debug is &lt;3.10.0-1160.62.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829644" version="1" comment="kernel-doc is &lt;3.10.0-1160.62.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829645" version="1" comment="kernel-headers is &lt;3.10.0-1160.62.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829646" version="1" comment="kernel-tools is &lt;3.10.0-1160.62.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829647" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.62.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829649" version="1" comment="perf is &lt;3.10.0-1160.62.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829650" version="1" comment="python-perf is &lt;3.10.0-1160.62.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829651" version="1" comment="firefox is &lt;91.8.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829652" version="1" comment="thunderbird is &lt;91.8.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829653" version="1" comment="java-11-openjdk is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829654" version="1" comment="java-11-openjdk-demo is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829655" version="1" comment="java-11-openjdk-devel is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829656" version="1" comment="java-11-openjdk-headless is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829657" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829658" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829659" version="1" comment="java-11-openjdk-jmods is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829660" version="1" comment="java-11-openjdk-src is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829661" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.15.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829662" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.332.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829663" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.332.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829664" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.332.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829665" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.332.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829666" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.332.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829667" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.332.b09-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829668" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.332.b09-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829669" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.332.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829670" version="1" comment="firefox is &lt;91.9.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829671" version="1" comment="thunderbird is &lt;91.9.0-3.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829672" version="1" comment="gzip is &lt;1.5-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829673" version="1" comment="minizip is &lt;1.2.7-20.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829674" version="1" comment="minizip-devel is &lt;1.2.7-20.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829675" version="1" comment="zlib is &lt;1.2.7-20.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829676" version="1" comment="zlib-devel is &lt;1.2.7-20.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829677" version="1" comment="zlib-static is &lt;1.2.7-20.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829678" version="1" comment="bpftool is &lt;3.10.0-1160.66.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829679" version="1" comment="kernel is &lt;3.10.0-1160.66.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829680" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.66.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829681" version="1" comment="kernel-debug is &lt;3.10.0-1160.66.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829684" version="1" comment="kernel-doc is &lt;3.10.0-1160.66.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829685" version="1" comment="kernel-headers is &lt;3.10.0-1160.66.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829686" version="1" comment="kernel-tools is &lt;3.10.0-1160.66.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829687" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.66.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829689" version="1" comment="perf is &lt;3.10.0-1160.66.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829690" version="1" comment="python-perf is &lt;3.10.0-1160.66.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829691" version="1" comment="firefox is &lt;91.9.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829692" version="1" comment="thunderbird is &lt;91.9.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829693" version="1" comment="rsyslog is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829694" version="1" comment="rsyslog-crypto is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829695" version="1" comment="rsyslog-doc is &lt;8.24.0-57.el7_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829696" version="1" comment="rsyslog-elasticsearch is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829697" version="1" comment="rsyslog-gnutls is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829698" version="1" comment="rsyslog-gssapi is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829699" version="1" comment="rsyslog-kafka is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829700" version="1" comment="rsyslog-libdbi is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829701" version="1" comment="rsyslog-mmaudit is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829702" version="1" comment="rsyslog-mmjsonparse is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829703" version="1" comment="rsyslog-mmkubernetes is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829704" version="1" comment="rsyslog-mmnormalize is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829705" version="1" comment="rsyslog-mmsnmptrapd is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829706" version="1" comment="rsyslog-mysql is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829707" version="1" comment="rsyslog-pgsql is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829708" version="1" comment="rsyslog-relp is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829709" version="1" comment="rsyslog-snmp is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829710" version="1" comment="rsyslog-udpspoof is &lt;8.24.0-57.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829711" version="1" comment="firefox is &lt;91.10.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829712" version="1" comment="thunderbird is &lt;91.10.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829713" version="1" comment="python-twisted-web is &lt;12.1.0-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829714" version="1" comment="xz is &lt;5.2.2-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829715" version="1" comment="xz-compat-libs is &lt;5.2.2-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829716" version="1" comment="xz-devel is &lt;5.2.2-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829717" version="1" comment="xz-libs is &lt;5.2.2-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829718" version="1" comment="xz-lzma-compat is &lt;5.2.2-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829719" version="1" comment="postgresql is &lt;9.2.24-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829720" version="1" comment="postgresql-contrib is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829721" version="1" comment="postgresql-devel is &lt;9.2.24-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829722" version="1" comment="postgresql-docs is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829723" version="1" comment="postgresql-libs is &lt;9.2.24-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829724" version="1" comment="postgresql-plperl is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829725" version="1" comment="postgresql-plpython is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829726" version="1" comment="postgresql-pltcl is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829727" version="1" comment="postgresql-server is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829728" version="1" comment="postgresql-static is &lt;9.2.24-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829729" version="1" comment="postgresql-test is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829730" version="1" comment="postgresql-upgrade is &lt;9.2.24-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829731" version="1" comment="bpftool is &lt;3.10.0-1160.71.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829732" version="1" comment="kernel is &lt;3.10.0-1160.71.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829733" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.71.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829734" version="1" comment="kernel-debug is &lt;3.10.0-1160.71.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829737" version="1" comment="kernel-doc is &lt;3.10.0-1160.71.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829738" version="1" comment="kernel-headers is &lt;3.10.0-1160.71.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829739" version="1" comment="kernel-tools is &lt;3.10.0-1160.71.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829740" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.71.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829742" version="1" comment="perf is &lt;3.10.0-1160.71.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829743" version="1" comment="python-perf is &lt;3.10.0-1160.71.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829744" version="1" comment="python-virtualenv is &lt;15.1.0-7.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829745" version="1" comment="python is &lt;2.7.5-92.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829746" version="1" comment="python-debug is &lt;2.7.5-92.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829747" version="1" comment="python-devel is &lt;2.7.5-92.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829748" version="1" comment="python-libs is &lt;2.7.5-92.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829749" version="1" comment="python-test is &lt;2.7.5-92.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829750" version="1" comment="python-tools is &lt;2.7.5-92.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829751" version="1" comment="tkinter is &lt;2.7.5-92.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829752" version="1" comment="389-ds-base is &lt;1.3.10.2-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829753" version="1" comment="389-ds-base-devel is &lt;1.3.10.2-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829754" version="1" comment="389-ds-base-libs is &lt;1.3.10.2-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829755" version="1" comment="389-ds-base-snmp is &lt;1.3.10.2-16.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829756" version="1" comment="firefox is &lt;91.11.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829757" version="1" comment="thunderbird is &lt;91.11.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829758" version="1" comment="squid is &lt;3.5.20-17.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829759" version="1" comment="squid-migration-script is &lt;3.5.20-17.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829760" version="1" comment="squid-sysvinit is &lt;3.5.20-17.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829761" version="1" comment="java-11-openjdk is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829762" version="1" comment="java-11-openjdk-demo is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829763" version="1" comment="java-11-openjdk-devel is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829764" version="1" comment="java-11-openjdk-headless is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829765" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829766" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829767" version="1" comment="java-11-openjdk-jmods is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829768" version="1" comment="java-11-openjdk-src is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829769" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.16.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829770" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.342.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829771" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.342.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829772" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.342.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829773" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.342.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829774" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.342.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829775" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.342.b07-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829776" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.342.b07-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829777" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.342.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829778" version="1" comment="thunderbird is &lt;91.12.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829779" version="1" comment="firefox is &lt;91.12.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829780" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829781" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829782" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829783" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829784" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829785" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829786" version="1" comment="xorg-x11-server-common is &lt;1.20.4-18.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829787" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-18.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829788" version="1" comment="xorg-x11-server-source is &lt;1.20.4-18.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829789" version="1" comment="bpftool is &lt;3.10.0-1160.76.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829790" version="1" comment="kernel is &lt;3.10.0-1160.76.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829791" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.76.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829792" version="1" comment="kernel-debug is &lt;3.10.0-1160.76.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829795" version="1" comment="kernel-doc is &lt;3.10.0-1160.76.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829796" version="1" comment="kernel-headers is &lt;3.10.0-1160.76.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829797" version="1" comment="kernel-tools is &lt;3.10.0-1160.76.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829798" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.76.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829800" version="1" comment="perf is &lt;3.10.0-1160.76.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829801" version="1" comment="python-perf is &lt;3.10.0-1160.76.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829802" version="1" comment="libgudev1 is &lt;219-78.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829803" version="1" comment="libgudev1-devel is &lt;219-78.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829804" version="1" comment="systemd is &lt;219-78.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829805" version="1" comment="systemd-devel is &lt;219-78.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829806" version="1" comment="systemd-journal-gateway is &lt;219-78.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829807" version="1" comment="systemd-libs is &lt;219-78.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829808" version="1" comment="systemd-networkd is &lt;219-78.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829809" version="1" comment="systemd-python is &lt;219-78.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829810" version="1" comment="systemd-resolved is &lt;219-78.el7_9.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829811" version="1" comment="systemd-sysv is &lt;219-78.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829812" version="1" comment="thunderbird is &lt;91.13.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829813" version="1" comment="rsync is &lt;3.1.2-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829814" version="1" comment="firefox is &lt;91.13.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829815" version="1" comment="open-vm-tools is &lt;11.0.5-3.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829816" version="1" comment="open-vm-tools-desktop is &lt;11.0.5-3.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829817" version="1" comment="open-vm-tools-devel is &lt;11.0.5-3.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829818" version="1" comment="open-vm-tools-test is &lt;11.0.5-3.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829819" version="1" comment="thunderbird is &lt;102.3.0-3.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829820" version="1" comment="firefox is &lt;102.3.0-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829821" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829822" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829823" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829824" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829825" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829826" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829827" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829828" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829829" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829830" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829831" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829832" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829833" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829834" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829835" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829836" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829837" version="1" comment="squid is &lt;3.5.20-17.el7_9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829838" version="1" comment="squid-migration-script is &lt;3.5.20-17.el7_9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829839" version="1" comment="squid-sysvinit is &lt;3.5.20-17.el7_9.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829840" version="1" comment="expat is &lt;2.1.0-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829841" version="1" comment="expat-devel is &lt;2.1.0-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829842" version="1" comment="expat-static is &lt;2.1.0-15.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829843" version="1" comment="firefox is &lt;102.3.0-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829844" version="1" comment="thunderbird is &lt;102.3.0-4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829845" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.352.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829846" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.352.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829847" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.352.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829848" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.352.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829849" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.352.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829850" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.352.b08-2.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829851" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.352.b08-2.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829852" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.352.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829853" version="1" comment="java-11-openjdk is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829854" version="1" comment="java-11-openjdk-demo is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829855" version="1" comment="java-11-openjdk-devel is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829856" version="1" comment="java-11-openjdk-headless is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829857" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829858" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829859" version="1" comment="java-11-openjdk-jmods is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829860" version="1" comment="java-11-openjdk-src is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829861" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.17.0.8-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829862" version="1" comment="firefox is &lt;102.4.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829863" version="1" comment="pki-base is &lt;10.5.18-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829864" version="1" comment="pki-base-java is &lt;10.5.18-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829865" version="1" comment="pki-ca is &lt;10.5.18-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829866" version="1" comment="pki-javadoc is &lt;10.5.18-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829867" version="1" comment="pki-kra is &lt;10.5.18-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829868" version="1" comment="pki-server is &lt;10.5.18-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829869" version="1" comment="pki-symkey is &lt;10.5.18-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829870" version="1" comment="pki-tools is &lt;10.5.18-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829871" version="1" comment="389-ds-base is &lt;1.3.10.2-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829872" version="1" comment="389-ds-base-devel is &lt;1.3.10.2-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829873" version="1" comment="389-ds-base-libs is &lt;1.3.10.2-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829874" version="1" comment="389-ds-base-snmp is &lt;1.3.10.2-17.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829875" version="1" comment="libksba is &lt;1.3.0-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829876" version="1" comment="libksba-devel is &lt;1.3.0-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829877" version="1" comment="thunderbird is &lt;102.4.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829878" version="1" comment="device-mapper-multipath is &lt;0.4.9-136.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829879" version="1" comment="device-mapper-multipath-devel is &lt;0.4.9-136.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829880" version="1" comment="device-mapper-multipath-libs is &lt;0.4.9-136.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829881" version="1" comment="device-mapper-multipath-sysvinit is &lt;0.4.9-136.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829882" version="1" comment="kpartx is &lt;0.4.9-136.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829883" version="1" comment="libdmmp is &lt;0.4.9-136.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829884" version="1" comment="libdmmp-devel is &lt;0.4.9-136.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829885" version="1" comment="bpftool is &lt;3.10.0-1160.80.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829886" version="1" comment="kernel is &lt;3.10.0-1160.80.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829887" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.80.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829888" version="1" comment="kernel-debug is &lt;3.10.0-1160.80.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829891" version="1" comment="kernel-doc is &lt;3.10.0-1160.80.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829892" version="1" comment="kernel-headers is &lt;3.10.0-1160.80.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829893" version="1" comment="kernel-tools is &lt;3.10.0-1160.80.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829894" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.80.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829896" version="1" comment="perf is &lt;3.10.0-1160.80.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829897" version="1" comment="python-perf is &lt;3.10.0-1160.80.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829898" version="1" comment="php-pear is &lt;1.9.4-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829899" version="1" comment="pcs is &lt;0.9.169-3.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829900" version="1" comment="pcs-snmp is &lt;0.9.169-3.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829901" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-19.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829902" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-19.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829903" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-19.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829904" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-19.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829905" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-19.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829906" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-19.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829907" version="1" comment="xorg-x11-server-common is &lt;1.20.4-19.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829908" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829909" version="1" comment="xorg-x11-server-source is &lt;1.20.4-19.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829910" version="1" comment="firefox is &lt;102.5.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829911" version="1" comment="thunderbird is &lt;102.5.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829912" version="1" comment="hsqldb is &lt;1.8.1.3-15.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829913" version="1" comment="hsqldb-demo is &lt;1.8.1.3-15.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829914" version="1" comment="hsqldb-javadoc is &lt;1.8.1.3-15.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829915" version="1" comment="hsqldb-manual is &lt;1.8.1.3-15.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829916" version="1" comment="krb5-devel is &lt;1.15.1-55.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829917" version="1" comment="krb5-libs is &lt;1.15.1-55.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829918" version="1" comment="krb5-pkinit is &lt;1.15.1-55.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829919" version="1" comment="krb5-server is &lt;1.15.1-55.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829920" version="1" comment="krb5-server-ldap is &lt;1.15.1-55.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829921" version="1" comment="krb5-workstation is &lt;1.15.1-55.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829922" version="1" comment="libkadm5 is &lt;1.15.1-55.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829923" version="1" comment="pki-base is &lt;10.5.18-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829924" version="1" comment="pki-base-java is &lt;10.5.18-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829925" version="1" comment="pki-ca is &lt;10.5.18-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829926" version="1" comment="pki-javadoc is &lt;10.5.18-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829927" version="1" comment="pki-kra is &lt;10.5.18-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829928" version="1" comment="pki-server is &lt;10.5.18-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829929" version="1" comment="pki-symkey is &lt;10.5.18-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829930" version="1" comment="pki-tools is &lt;10.5.18-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829931" version="1" comment="grub2 is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829932" version="1" comment="grub2-common is &lt;2.02-0.87.el7_9.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829933" version="1" comment="grub2-efi-ia32 is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829934" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829935" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-0.87.el7_9.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829936" version="1" comment="grub2-efi-x64 is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829937" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829938" version="1" comment="grub2-efi-x64-modules is &lt;2.02-0.87.el7_9.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829939" version="1" comment="grub2-pc is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829940" version="1" comment="grub2-pc-modules is &lt;2.02-0.87.el7_9.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829941" version="1" comment="grub2-tools is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829942" version="1" comment="grub2-tools-extra is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829943" version="1" comment="grub2-tools-minimal is &lt;2.02-0.87.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829944" version="1" comment="bcel is &lt;5.2-19.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829945" version="1" comment="bcel-javadoc is &lt;5.2-19.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829946" version="1" comment="firefox is &lt;102.6.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829947" version="1" comment="thunderbird is &lt;102.6.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829948" version="1" comment="tigervnc is &lt;1.8.0-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829949" version="1" comment="tigervnc-icons is &lt;1.8.0-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829950" version="1" comment="tigervnc-license is &lt;1.8.0-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829951" version="1" comment="tigervnc-server is &lt;1.8.0-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829952" version="1" comment="tigervnc-server-applet is &lt;1.8.0-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829953" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829954" version="1" comment="tigervnc-server-module is &lt;1.8.0-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829955" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829956" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829957" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829958" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829959" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829960" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829961" version="1" comment="xorg-x11-server-common is &lt;1.20.4-21.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829962" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829963" version="1" comment="xorg-x11-server-source is &lt;1.20.4-21.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829964" version="1" comment="dpdk is &lt;18.11.8-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829965" version="1" comment="dpdk-devel is &lt;18.11.8-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829966" version="1" comment="dpdk-doc is &lt;18.11.8-2.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829967" version="1" comment="dpdk-tools is &lt;18.11.8-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829968" version="1" comment="java-11-openjdk is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829969" version="1" comment="java-11-openjdk-demo is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829970" version="1" comment="java-11-openjdk-devel is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829971" version="1" comment="java-11-openjdk-headless is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829972" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829973" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829974" version="1" comment="java-11-openjdk-jmods is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829975" version="1" comment="java-11-openjdk-src is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829976" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.18.0.10-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829977" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.362.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829978" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.362.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829979" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.362.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829980" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.362.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829981" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.362.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829982" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.362.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829983" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.362.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829984" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.362.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829985" version="1" comment="sudo is &lt;1.8.23-10.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829986" version="1" comment="sudo-devel is &lt;1.8.23-10.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829987" version="1" comment="firefox is &lt;102.7.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829988" version="1" comment="libXpm is &lt;3.5.12-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829989" version="1" comment="libXpm-devel is &lt;3.5.12-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829990" version="1" comment="bpftool is &lt;3.10.0-1160.83.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829991" version="1" comment="kernel is &lt;3.10.0-1160.83.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829992" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.83.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829993" version="1" comment="kernel-debug is &lt;3.10.0-1160.83.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829996" version="1" comment="kernel-doc is &lt;3.10.0-1160.83.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829997" version="1" comment="kernel-headers is &lt;3.10.0-1160.83.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829998" version="1" comment="kernel-tools is &lt;3.10.0-1160.83.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009829999" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.83.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830001" version="1" comment="perf is &lt;3.10.0-1160.83.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830002" version="1" comment="python-perf is &lt;3.10.0-1160.83.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830003" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830004" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830005" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830006" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830007" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830008" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830009" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830010" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.13 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830011" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830012" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830013" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830014" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830015" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830016" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830017" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830018" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830019" version="1" comment="libipa_hbac is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830020" version="1" comment="libipa_hbac-devel is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830021" version="1" comment="libsss_autofs is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830022" version="1" comment="libsss_certmap is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830023" version="1" comment="libsss_certmap-devel is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830024" version="1" comment="libsss_idmap is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830025" version="1" comment="libsss_idmap-devel is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830026" version="1" comment="libsss_nss_idmap is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830027" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830028" version="1" comment="libsss_simpleifp is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830029" version="1" comment="libsss_simpleifp-devel is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830030" version="1" comment="libsss_sudo is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830031" version="1" comment="python-libipa_hbac is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830032" version="1" comment="python-libsss_nss_idmap is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830033" version="1" comment="python-sss is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830034" version="1" comment="python-sss-murmur is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830035" version="1" comment="python-sssdconfig is &lt;1.16.5-10.el7_9.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830036" version="1" comment="sssd is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830037" version="1" comment="sssd-ad is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830038" version="1" comment="sssd-client is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830039" version="1" comment="sssd-common is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830040" version="1" comment="sssd-common-pac is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830041" version="1" comment="sssd-dbus is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830042" version="1" comment="sssd-ipa is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830043" version="1" comment="sssd-kcm is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830044" version="1" comment="sssd-krb5 is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830045" version="1" comment="sssd-krb5-common is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830046" version="1" comment="sssd-ldap is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830047" version="1" comment="sssd-libwbclient is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830048" version="1" comment="sssd-libwbclient-devel is &lt;1.16.5-10.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830049" version="1" comment="sssd-polkit-rules is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830050" version="1" comment="sssd-proxy is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830051" version="1" comment="sssd-tools is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830052" version="1" comment="sssd-winbind-idmap is &lt;1.16.5-10.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830053" version="1" comment="thunderbird is &lt;102.7.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830054" version="1" comment="libksba is &lt;1.3.0-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830055" version="1" comment="libksba-devel is &lt;1.3.0-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830056" version="1" comment="thunderbird is &lt;102.7.1-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830057" version="1" comment="tigervnc is &lt;1.8.0-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830058" version="1" comment="tigervnc-icons is &lt;1.8.0-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830059" version="1" comment="tigervnc-license is &lt;1.8.0-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830060" version="1" comment="tigervnc-server is &lt;1.8.0-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830061" version="1" comment="tigervnc-server-applet is &lt;1.8.0-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830062" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830063" version="1" comment="tigervnc-server-module is &lt;1.8.0-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830064" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830065" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830066" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830067" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830068" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830069" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830070" version="1" comment="xorg-x11-server-common is &lt;1.20.4-22.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830071" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-22.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830072" version="1" comment="xorg-x11-server-source is &lt;1.20.4-22.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830073" version="1" comment="firefox is &lt;102.8.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830074" version="1" comment="thunderbird is &lt;102.8.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830075" version="1" comment="emacs-git is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830076" version="1" comment="emacs-git-el is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830077" version="1" comment="git is &lt;1.8.3.1-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830078" version="1" comment="git-all is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830079" version="1" comment="git-bzr is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830080" version="1" comment="git-cvs is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830081" version="1" comment="git-daemon is &lt;1.8.3.1-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830082" version="1" comment="git-email is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830083" version="1" comment="git-gnome-keyring is &lt;1.8.3.1-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830084" version="1" comment="git-gui is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830085" version="1" comment="git-hg is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830086" version="1" comment="git-instaweb is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830087" version="1" comment="git-p4 is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830088" version="1" comment="git-svn is &lt;1.8.3.1-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830089" version="1" comment="gitk is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830090" version="1" comment="gitweb is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830091" version="1" comment="perl-Git is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830092" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830093" version="1" comment="ctdb is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830094" version="1" comment="ctdb-tests is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830095" version="1" comment="libsmbclient is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830096" version="1" comment="libsmbclient-devel is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830097" version="1" comment="libwbclient is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830098" version="1" comment="libwbclient-devel is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830099" version="1" comment="samba is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830100" version="1" comment="samba-client is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830101" version="1" comment="samba-client-libs is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830102" version="1" comment="samba-common is &lt;4.10.16-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830103" version="1" comment="samba-common-libs is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830104" version="1" comment="samba-common-tools is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830105" version="1" comment="samba-dc is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830106" version="1" comment="samba-dc-libs is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830107" version="1" comment="samba-devel is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830108" version="1" comment="samba-krb5-printing is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830109" version="1" comment="samba-libs is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830110" version="1" comment="samba-pidl is &lt;4.10.16-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830111" version="1" comment="samba-python is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830112" version="1" comment="samba-python-test is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830113" version="1" comment="samba-test is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830114" version="1" comment="samba-test-libs is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830115" version="1" comment="samba-vfs-glusterfs is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830116" version="1" comment="samba-winbind is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830117" version="1" comment="samba-winbind-clients is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830118" version="1" comment="samba-winbind-krb5-locator is &lt;4.10.16-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830119" version="1" comment="samba-winbind-modules is &lt;4.10.16-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830120" version="1" comment="bpftool is &lt;3.10.0-1160.88.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830121" version="1" comment="kernel is &lt;3.10.0-1160.88.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830122" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.88.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830123" version="1" comment="kernel-debug is &lt;3.10.0-1160.88.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830126" version="1" comment="kernel-doc is &lt;3.10.0-1160.88.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830127" version="1" comment="kernel-headers is &lt;3.10.0-1160.88.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830128" version="1" comment="kernel-tools is &lt;3.10.0-1160.88.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830129" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.88.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830131" version="1" comment="perf is &lt;3.10.0-1160.88.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830132" version="1" comment="python-perf is &lt;3.10.0-1160.88.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830133" version="1" comment="pesign is &lt;0.109-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830134" version="1" comment="minizip is &lt;1.2.7-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830135" version="1" comment="minizip-devel is &lt;1.2.7-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830136" version="1" comment="zlib is &lt;1.2.7-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830137" version="1" comment="zlib-devel is &lt;1.2.7-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830138" version="1" comment="zlib-static is &lt;1.2.7-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830139" version="1" comment="nss is &lt;3.79.0-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830140" version="1" comment="nss-devel is &lt;3.79.0-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830141" version="1" comment="nss-pkcs11-devel is &lt;3.79.0-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830142" version="1" comment="nss-sysinit is &lt;3.79.0-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830143" version="1" comment="nss-tools is &lt;3.79.0-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830144" version="1" comment="firefox is &lt;102.9.0-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830145" version="1" comment="openssl is &lt;1.0.2k-26.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830146" version="1" comment="openssl-devel is &lt;1.0.2k-26.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830147" version="1" comment="openssl-libs is &lt;1.0.2k-26.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830148" version="1" comment="openssl-perl is &lt;1.0.2k-26.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830149" version="1" comment="openssl-static is &lt;1.0.2k-26.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830150" version="1" comment="thunderbird is &lt;102.9.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830151" version="1" comment="httpd is &lt;2.4.6-98.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830152" version="1" comment="httpd-devel is &lt;2.4.6-98.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830153" version="1" comment="httpd-manual is &lt;2.4.6-98.el7_9.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830154" version="1" comment="httpd-tools is &lt;2.4.6-98.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830155" version="1" comment="mod_ldap is &lt;2.4.6-98.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830156" version="1" comment="mod_proxy_html is &lt;2.4.6-98.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830157" version="1" comment="mod_session is &lt;2.4.6-98.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830158" version="1" comment="mod_ssl is &lt;2.4.6-98.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830159" version="1" comment="tigervnc is &lt;1.8.0-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830160" version="1" comment="tigervnc-icons is &lt;1.8.0-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830161" version="1" comment="tigervnc-license is &lt;1.8.0-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830162" version="1" comment="tigervnc-server is &lt;1.8.0-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830163" version="1" comment="tigervnc-server-applet is &lt;1.8.0-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830164" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830165" version="1" comment="tigervnc-server-module is &lt;1.8.0-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830166" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830167" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830168" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830169" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830170" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830171" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830172" version="1" comment="xorg-x11-server-common is &lt;1.20.4-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830173" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-23.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830174" version="1" comment="xorg-x11-server-source is &lt;1.20.4-23.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830175" version="1" comment="firefox is &lt;102.10.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830176" version="1" comment="thunderbird is &lt;102.10.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830177" version="1" comment="java-11-openjdk is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830178" version="1" comment="java-11-openjdk-demo is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830179" version="1" comment="java-11-openjdk-devel is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830180" version="1" comment="java-11-openjdk-headless is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830181" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830182" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830183" version="1" comment="java-11-openjdk-jmods is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830184" version="1" comment="java-11-openjdk-src is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830185" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.19.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830186" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.372.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830187" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.372.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830188" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.372.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830189" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.372.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830190" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.372.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830191" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.372.b07-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830192" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.372.b07-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830193" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.372.b07-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830194" version="1" comment="bpftool is &lt;3.10.0-1160.90.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830195" version="1" comment="kernel is &lt;3.10.0-1160.90.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830196" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.90.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830197" version="1" comment="kernel-debug is &lt;3.10.0-1160.90.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830200" version="1" comment="kernel-doc is &lt;3.10.0-1160.90.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830201" version="1" comment="kernel-headers is &lt;3.10.0-1160.90.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830202" version="1" comment="kernel-tools is &lt;3.10.0-1160.90.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830203" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.90.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830205" version="1" comment="perf is &lt;3.10.0-1160.90.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830206" version="1" comment="python-perf is &lt;3.10.0-1160.90.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830207" version="1" comment="libwebp is &lt;0.3.0-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830208" version="1" comment="libwebp-devel is &lt;0.3.0-11.el7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830209" version="1" comment="libwebp-java is &lt;0.3.0-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830210" version="1" comment="libwebp-tools is &lt;0.3.0-11.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830211" version="1" comment="firefox is &lt;102.11.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830212" version="1" comment="apr-util is &lt;1.5.2-6.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830213" version="1" comment="apr-util-devel is &lt;1.5.2-6.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830214" version="1" comment="apr-util-ldap is &lt;1.5.2-6.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830215" version="1" comment="apr-util-mysql is &lt;1.5.2-6.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830216" version="1" comment="apr-util-nss is &lt;1.5.2-6.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830217" version="1" comment="apr-util-odbc is &lt;1.5.2-6.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830218" version="1" comment="apr-util-openssl is &lt;1.5.2-6.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830219" version="1" comment="apr-util-pgsql is &lt;1.5.2-6.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830220" version="1" comment="apr-util-sqlite is &lt;1.5.2-6.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830221" version="1" comment="thunderbird is &lt;102.11.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830222" version="1" comment="emacs-git is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830223" version="1" comment="emacs-git-el is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830224" version="1" comment="git is &lt;1.8.3.1-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830225" version="1" comment="git-all is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830226" version="1" comment="git-bzr is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830227" version="1" comment="git-cvs is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830228" version="1" comment="git-daemon is &lt;1.8.3.1-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830229" version="1" comment="git-email is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830230" version="1" comment="git-gnome-keyring is &lt;1.8.3.1-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830231" version="1" comment="git-gui is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830232" version="1" comment="git-hg is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830233" version="1" comment="git-instaweb is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830234" version="1" comment="git-p4 is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830235" version="1" comment="git-svn is &lt;1.8.3.1-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830236" version="1" comment="gitk is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830237" version="1" comment="gitweb is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830238" version="1" comment="perl-Git is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830239" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830240" version="1" comment="emacs is &lt;24.3-23.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830241" version="1" comment="emacs-common is &lt;24.3-23.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830242" version="1" comment="emacs-el is &lt;24.3-23.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830243" version="1" comment="emacs-filesystem is &lt;24.3-23.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830244" version="1" comment="emacs-nox is &lt;24.3-23.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830245" version="1" comment="emacs-terminal is &lt;24.3-23.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830246" version="1" comment="python is &lt;2.7.5-93.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830247" version="1" comment="python-debug is &lt;2.7.5-93.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830248" version="1" comment="python-devel is &lt;2.7.5-93.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830249" version="1" comment="python-libs is &lt;2.7.5-93.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830250" version="1" comment="python-test is &lt;2.7.5-93.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830251" version="1" comment="python-tools is &lt;2.7.5-93.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830252" version="1" comment="tkinter is &lt;2.7.5-93.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830253" version="1" comment="python3 is &lt;3.6.8-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830254" version="1" comment="python3-debug is &lt;3.6.8-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830255" version="1" comment="python3-devel is &lt;3.6.8-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830256" version="1" comment="python3-idle is &lt;3.6.8-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830257" version="1" comment="python3-libs is &lt;3.6.8-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830258" version="1" comment="python3-test is &lt;3.6.8-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830259" version="1" comment="python3-tkinter is &lt;3.6.8-19.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830260" version="1" comment="thunderbird is &lt;102.12.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830261" version="1" comment="firefox is &lt;102.12.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830262" version="1" comment="c-ares is &lt;1.10.0-3.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830263" version="1" comment="c-ares-devel is &lt;1.10.0-3.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830264" version="1" comment="open-vm-tools is &lt;11.0.5-3.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830265" version="1" comment="open-vm-tools-desktop is &lt;11.0.5-3.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830266" version="1" comment="open-vm-tools-devel is &lt;11.0.5-3.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830267" version="1" comment="open-vm-tools-test is &lt;11.0.5-3.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830268" version="1" comment="thunderbird is &lt;102.13.0-2.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830269" version="1" comment="firefox is &lt;102.13.0-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830270" version="1" comment="bpftool is &lt;3.10.0-1160.95.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830271" version="1" comment="kernel is &lt;3.10.0-1160.95.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830272" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.95.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830273" version="1" comment="kernel-debug is &lt;3.10.0-1160.95.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830276" version="1" comment="kernel-doc is &lt;3.10.0-1160.95.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830277" version="1" comment="kernel-headers is &lt;3.10.0-1160.95.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830278" version="1" comment="kernel-tools is &lt;3.10.0-1160.95.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830279" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.95.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830281" version="1" comment="perf is &lt;3.10.0-1160.95.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830282" version="1" comment="python-perf is &lt;3.10.0-1160.95.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830283" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830284" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830285" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830286" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830287" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830288" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830289" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830290" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830291" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830292" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830293" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830294" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.14 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830295" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830296" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830297" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830298" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830299" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.382.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830300" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.382.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830301" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.382.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830302" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.382.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830303" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.382.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830304" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.382.b05-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830305" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.382.b05-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830306" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.382.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830307" version="1" comment="java-11-openjdk is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830308" version="1" comment="java-11-openjdk-demo is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830309" version="1" comment="java-11-openjdk-devel is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830310" version="1" comment="java-11-openjdk-headless is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830311" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830312" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830313" version="1" comment="java-11-openjdk-jmods is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830314" version="1" comment="java-11-openjdk-src is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830315" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.20.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830316" version="1" comment="iperf3 is &lt;3.1.7-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830317" version="1" comment="iperf3-devel is &lt;3.1.7-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830318" version="1" comment="openssh is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830319" version="1" comment="openssh-askpass is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830320" version="1" comment="openssh-cavs is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830321" version="1" comment="openssh-clients is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830322" version="1" comment="openssh-keycat is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830323" version="1" comment="openssh-ldap is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830324" version="1" comment="openssh-server is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830325" version="1" comment="openssh-server-sysvinit is &lt;7.4p1-23.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830326" version="1" comment="pam_ssh_agent_auth is &lt;0.10.3-2.23.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830327" version="1" comment="firefox is &lt;102.14.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830328" version="1" comment="thunderbird is &lt;102.14.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830329" version="1" comment="cups is &lt;1.6.3-52.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830330" version="1" comment="cups-client is &lt;1.6.3-52.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830331" version="1" comment="cups-devel is &lt;1.6.3-52.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830332" version="1" comment="cups-filesystem is &lt;1.6.3-52.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830333" version="1" comment="cups-ipptool is &lt;1.6.3-52.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830334" version="1" comment="cups-libs is &lt;1.6.3-52.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830335" version="1" comment="cups-lpd is &lt;1.6.3-52.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830336" version="1" comment="bpftool is &lt;3.10.0-1160.99.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830337" version="1" comment="kernel is &lt;3.10.0-1160.99.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830338" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.99.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830339" version="1" comment="kernel-debug is &lt;3.10.0-1160.99.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830342" version="1" comment="kernel-doc is &lt;3.10.0-1160.99.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830343" version="1" comment="kernel-headers is &lt;3.10.0-1160.99.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830344" version="1" comment="kernel-tools is &lt;3.10.0-1160.99.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830345" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.99.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830347" version="1" comment="perf is &lt;3.10.0-1160.99.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830348" version="1" comment="python-perf is &lt;3.10.0-1160.99.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830349" version="1" comment="thunderbird is &lt;102.15.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830350" version="1" comment="firefox is &lt;102.15.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830351" version="1" comment="thunderbird is &lt;102.15.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830352" version="1" comment="firefox is &lt;102.15.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830353" version="1" comment="open-vm-tools is &lt;11.0.5-3.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830354" version="1" comment="open-vm-tools-desktop is &lt;11.0.5-3.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830355" version="1" comment="open-vm-tools-devel is &lt;11.0.5-3.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830356" version="1" comment="open-vm-tools-test is &lt;11.0.5-3.el7_9.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830357" version="1" comment="ImageMagick is &lt;6.9.10.68-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830358" version="1" comment="ImageMagick-c++ is &lt;6.9.10.68-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830359" version="1" comment="ImageMagick-c++-devel is &lt;6.9.10.68-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830360" version="1" comment="ImageMagick-devel is &lt;6.9.10.68-7.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830361" version="1" comment="ImageMagick-doc is &lt;6.9.10.68-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830362" version="1" comment="ImageMagick-perl is &lt;6.9.10.68-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830363" version="1" comment="thunderbird is &lt;115.3.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830364" version="1" comment="firefox is &lt;115.3.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830365" version="1" comment="libssh2 is &lt;1.8.0-4.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830366" version="1" comment="libssh2-devel is &lt;1.8.0-4.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830367" version="1" comment="libssh2-docs is &lt;1.8.0-4.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830368" version="1" comment="python-reportlab is &lt;2.5-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830369" version="1" comment="python-reportlab-docs is &lt;2.5-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830370" version="1" comment="bpftool is &lt;3.10.0-1160.102.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830371" version="1" comment="kernel is &lt;3.10.0-1160.102.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830372" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.102.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830373" version="1" comment="kernel-debug is &lt;3.10.0-1160.102.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830376" version="1" comment="kernel-doc is &lt;3.10.0-1160.102.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830377" version="1" comment="kernel-headers is &lt;3.10.0-1160.102.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830378" version="1" comment="kernel-tools is &lt;3.10.0-1160.102.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830379" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.102.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830381" version="1" comment="perf is &lt;3.10.0-1160.102.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830382" version="1" comment="python-perf is &lt;3.10.0-1160.102.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830383" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830384" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830385" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830386" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830387" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830388" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830389" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830390" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830391" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830392" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830393" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830394" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.15 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830395" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830396" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830397" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830398" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830399" version="1" comment="java-11-openjdk is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830400" version="1" comment="java-11-openjdk-demo is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830401" version="1" comment="java-11-openjdk-devel is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830402" version="1" comment="java-11-openjdk-headless is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830403" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830404" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830405" version="1" comment="java-11-openjdk-jmods is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830406" version="1" comment="java-11-openjdk-src is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830407" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.21.0.9-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830408" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.392.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830409" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.392.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830410" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.392.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830411" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.392.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830412" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.392.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830413" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.392.b08-2.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830414" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.392.b08-2.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830415" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.392.b08-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830416" version="1" comment="firefox is &lt;115.4.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830417" version="1" comment="thunderbird is &lt;115.4.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830418" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830419" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830420" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830421" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830422" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830423" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830424" version="1" comment="xorg-x11-server-common is &lt;1.20.4-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830425" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830426" version="1" comment="xorg-x11-server-source is &lt;1.20.4-24.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830427" version="1" comment="squid is &lt;3.5.20-17.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830428" version="1" comment="squid-migration-script is &lt;3.5.20-17.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830429" version="1" comment="squid-sysvinit is &lt;3.5.20-17.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830430" version="1" comment="python3 is &lt;3.6.8-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830431" version="1" comment="python3-debug is &lt;3.6.8-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830432" version="1" comment="python3-devel is &lt;3.6.8-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830433" version="1" comment="python3-idle is &lt;3.6.8-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830434" version="1" comment="python3-libs is &lt;3.6.8-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830435" version="1" comment="python3-test is &lt;3.6.8-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830436" version="1" comment="python3-tkinter is &lt;3.6.8-21.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830437" version="1" comment="python is &lt;2.7.5-94.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830438" version="1" comment="python-debug is &lt;2.7.5-94.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830439" version="1" comment="python-devel is &lt;2.7.5-94.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830440" version="1" comment="python-libs is &lt;2.7.5-94.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830441" version="1" comment="python-test is &lt;2.7.5-94.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830442" version="1" comment="python-tools is &lt;2.7.5-94.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830443" version="1" comment="tkinter is &lt;2.7.5-94.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830444" version="1" comment="plexus-archiver is &lt;2.4.2-6.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830445" version="1" comment="plexus-archiver-javadoc is &lt;2.4.2-6.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830446" version="1" comment="open-vm-tools is &lt;11.0.5-3.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830447" version="1" comment="open-vm-tools-desktop is &lt;11.0.5-3.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830448" version="1" comment="open-vm-tools-devel is &lt;11.0.5-3.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830449" version="1" comment="open-vm-tools-test is &lt;11.0.5-3.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830450" version="1" comment="bpftool is &lt;3.10.0-1160.105.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830451" version="1" comment="kernel is &lt;3.10.0-1160.105.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830452" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.105.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830453" version="1" comment="kernel-debug is &lt;3.10.0-1160.105.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830456" version="1" comment="kernel-doc is &lt;3.10.0-1160.105.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830457" version="1" comment="kernel-headers is &lt;3.10.0-1160.105.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830458" version="1" comment="kernel-tools is &lt;3.10.0-1160.105.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830459" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.105.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830461" version="1" comment="perf is &lt;3.10.0-1160.105.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830462" version="1" comment="python-perf is &lt;3.10.0-1160.105.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830463" version="1" comment="tigervnc is &lt;1.8.0-26.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830464" version="1" comment="tigervnc-icons is &lt;1.8.0-26.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830465" version="1" comment="tigervnc-license is &lt;1.8.0-26.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830466" version="1" comment="tigervnc-server is &lt;1.8.0-26.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830467" version="1" comment="tigervnc-server-applet is &lt;1.8.0-26.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830468" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-26.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830469" version="1" comment="tigervnc-server-module is &lt;1.8.0-26.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830470" version="1" comment="thunderbird is &lt;115.5.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830471" version="1" comment="firefox is &lt;115.5.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830472" version="1" comment="iwl100-firmware is &lt;39.31.5.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830473" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830474" version="1" comment="iwl105-firmware is &lt;18.168.6.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830475" version="1" comment="iwl135-firmware is &lt;18.168.6.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830476" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830477" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830478" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830479" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830480" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830481" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830482" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830483" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830484" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830485" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830486" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830487" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-81.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830488" version="1" comment="linux-firmware is &lt;20200421-81.git78c0348.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830489" version="1" comment="curl is &lt;7.29.0-59.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830490" version="1" comment="libcurl is &lt;7.29.0-59.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830491" version="1" comment="libcurl-devel is &lt;7.29.0-59.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830492" version="1" comment="postgresql is &lt;9.2.24-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830493" version="1" comment="postgresql-contrib is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830494" version="1" comment="postgresql-devel is &lt;9.2.24-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830495" version="1" comment="postgresql-docs is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830496" version="1" comment="postgresql-libs is &lt;9.2.24-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830497" version="1" comment="postgresql-plperl is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830498" version="1" comment="postgresql-plpython is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830499" version="1" comment="postgresql-pltcl is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830500" version="1" comment="postgresql-server is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830501" version="1" comment="postgresql-static is &lt;9.2.24-9.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830502" version="1" comment="postgresql-test is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830503" version="1" comment="postgresql-upgrade is &lt;9.2.24-9.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830504" version="1" comment="tigervnc is &lt;1.8.0-28.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830505" version="1" comment="tigervnc-icons is &lt;1.8.0-28.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830506" version="1" comment="tigervnc-license is &lt;1.8.0-28.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830507" version="1" comment="tigervnc-server is &lt;1.8.0-28.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830508" version="1" comment="tigervnc-server-applet is &lt;1.8.0-28.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830509" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-28.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830510" version="1" comment="tigervnc-server-module is &lt;1.8.0-28.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830511" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830512" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830513" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830514" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830515" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830516" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830517" version="1" comment="xorg-x11-server-common is &lt;1.20.4-25.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830518" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-25.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830519" version="1" comment="xorg-x11-server-source is &lt;1.20.4-25.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830520" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.10.4-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830521" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.10.4-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830522" version="1" comment="gstreamer1-plugins-bad-free-gtk is &lt;1.10.4-4.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830523" version="1" comment="firefox is &lt;115.6.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830524" version="1" comment="thunderbird is &lt;115.6.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830525" version="1" comment="ipa-client is &lt;4.6.8-5.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830526" version="1" comment="ipa-client-common is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830527" version="1" comment="ipa-common is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830528" version="1" comment="ipa-python-compat is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830529" version="1" comment="ipa-server is &lt;4.6.8-5.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830530" version="1" comment="ipa-server-common is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830531" version="1" comment="ipa-server-dns is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830532" version="1" comment="ipa-server-trust-ad is &lt;4.6.8-5.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830533" version="1" comment="python2-ipaclient is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830534" version="1" comment="python2-ipalib is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830535" version="1" comment="python2-ipaserver is &lt;4.6.8-5.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830536" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.402.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830537" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.402.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830538" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.402.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830539" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.402.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830540" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.402.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830541" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.402.b06-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830542" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.402.b06-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830543" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.402.b06-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830544" version="1" comment="java-11-openjdk is &lt;11.0.22.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830545" version="1" comment="java-11-openjdk-devel is &lt;11.0.22.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830546" version="1" comment="java-11-openjdk-headless is &lt;11.0.22.0.7-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830547" version="1" comment="gstreamer-plugins-bad-free is &lt;0.10.23-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830548" version="1" comment="gstreamer-plugins-bad-free-devel is &lt;0.10.23-24.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830549" version="1" comment="gstreamer-plugins-bad-free-devel-docs is &lt;0.10.23-24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830550" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830551" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830552" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830553" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830554" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830555" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830556" version="1" comment="xorg-x11-server-common is &lt;1.20.4-27.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830557" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-27.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009830558" version="1" comment="xorg-x11-server-source is &lt;1.20.4-27.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009195643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844291" version="1" comment="LibRaw is &lt;0.19.4-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844292" version="1" comment="LibRaw-devel is &lt;0.19.4-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844293" version="1" comment="LibRaw-static is &lt;0.19.4-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849764" version="1" comment="python-pillow is &lt;2.0.0-24.gitd1c6db8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849765" version="1" comment="python-pillow-devel is &lt;2.0.0-24.gitd1c6db8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849766" version="1" comment="python-pillow-doc is &lt;2.0.0-24.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849767" version="1" comment="python-pillow-qt is &lt;2.0.0-24.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849768" version="1" comment="python-pillow-sane is &lt;2.0.0-24.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849769" version="1" comment="python-pillow-tk is &lt;2.0.0-24.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844447" version="1" comment="bpftool is &lt;3.10.0-1160.108.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844448" version="1" comment="kernel is &lt;3.10.0-1160.108.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844449" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.108.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844450" version="1" comment="kernel-debug is &lt;3.10.0-1160.108.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844453" version="1" comment="kernel-doc is &lt;3.10.0-1160.108.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844454" version="1" comment="kernel-headers is &lt;3.10.0-1160.108.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844455" version="1" comment="kernel-tools is &lt;3.10.0-1160.108.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844456" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.108.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844458" version="1" comment="perf is &lt;3.10.0-1160.108.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844459" version="1" comment="python-perf is &lt;3.10.0-1160.108.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845118" version="1" comment="firefox is &lt;115.7.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846116" version="1" comment="thunderbird is &lt;115.7.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846117" version="1" comment="tigervnc is &lt;1.8.0-31.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846118" version="1" comment="tigervnc-icons is &lt;1.8.0-31.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846119" version="1" comment="tigervnc-license is &lt;1.8.0-31.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846120" version="1" comment="tigervnc-server is &lt;1.8.0-31.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846121" version="1" comment="tigervnc-server-applet is &lt;1.8.0-31.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846122" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-31.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846123" version="1" comment="tigervnc-server-module is &lt;1.8.0-31.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846124" version="1" comment="iwl100-firmware is &lt;39.31.5.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846125" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846126" version="1" comment="iwl105-firmware is &lt;18.168.6.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846127" version="1" comment="iwl135-firmware is &lt;18.168.6.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846128" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846129" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846130" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846131" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846132" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846133" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846134" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846135" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846136" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846137" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846138" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846139" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-82.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846140" version="1" comment="linux-firmware is &lt;20200421-82.git78c0348.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849770" version="1" comment="python-pillow is &lt;2.0.0-25.gitd1c6db8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849771" version="1" comment="python-pillow-devel is &lt;2.0.0-25.gitd1c6db8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849772" version="1" comment="python-pillow-doc is &lt;2.0.0-25.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849773" version="1" comment="python-pillow-qt is &lt;2.0.0-25.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849774" version="1" comment="python-pillow-sane is &lt;2.0.0-25.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849775" version="1" comment="python-pillow-tk is &lt;2.0.0-25.gitd1c6db8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849776" version="1" comment="thunderbird is &lt;115.8.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849777" version="1" comment="firefox is &lt;115.8.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956837" version="1" comment="tuned is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956838" version="1" comment="tuned-gtk is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956839" version="1" comment="tuned-profiles-atomic is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956840" version="1" comment="tuned-profiles-compat is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956841" version="1" comment="tuned-profiles-cpu-partitioning is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956842" version="1" comment="tuned-profiles-mssql is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956843" version="1" comment="tuned-profiles-oracle is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956844" version="1" comment="tuned-utils is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956845" version="1" comment="tuned-utils-systemtap is &lt;2.11.0-13.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958972" version="1" comment="postgresql is &lt;9.2.24-9.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958973" version="1" comment="postgresql-contrib is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958974" version="1" comment="postgresql-devel is &lt;9.2.24-9.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958975" version="1" comment="postgresql-docs is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958976" version="1" comment="postgresql-libs is &lt;9.2.24-9.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958977" version="1" comment="postgresql-plperl is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958978" version="1" comment="postgresql-plpython is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958979" version="1" comment="postgresql-pltcl is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958980" version="1" comment="postgresql-server is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958981" version="1" comment="postgresql-static is &lt;9.2.24-9.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958982" version="1" comment="postgresql-test is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958983" version="1" comment="postgresql-upgrade is &lt;9.2.24-9.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959700" version="1" comment="unbound is &lt;1.6.6-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959701" version="1" comment="unbound-devel is &lt;1.6.6-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959702" version="1" comment="unbound-libs is &lt;1.6.6-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959703" version="1" comment="unbound-python is &lt;1.6.6-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958158" version="1" comment="python-virtualenv is &lt;15.1.0-7.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851792" version="1" comment="bpftool is &lt;3.10.0-1160.114.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851793" version="1" comment="kernel is &lt;3.10.0-1160.114.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851794" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.114.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851795" version="1" comment="kernel-debug is &lt;3.10.0-1160.114.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851798" version="1" comment="kernel-doc is &lt;3.10.0-1160.114.2.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851799" version="1" comment="kernel-headers is &lt;3.10.0-1160.114.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851800" version="1" comment="kernel-tools is &lt;3.10.0-1160.114.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851801" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.114.2.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851803" version="1" comment="perf is &lt;3.10.0-1160.114.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851804" version="1" comment="python-perf is &lt;3.10.0-1160.114.2.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852714" version="1" comment="firefox is &lt;115.9.1-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851985" version="1" comment="thunderbird is &lt;115.9.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854308" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-29.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854309" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-29.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854310" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-29.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854311" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-29.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854312" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-29.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854313" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-29.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854314" version="1" comment="xorg-x11-server-common is &lt;1.20.4-29.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854315" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-29.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854316" version="1" comment="xorg-x11-server-source is &lt;1.20.4-29.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854317" version="1" comment="squid is &lt;3.5.20-17.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854318" version="1" comment="squid-migration-script is &lt;3.5.20-17.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854319" version="1" comment="squid-sysvinit is &lt;3.5.20-17.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858056" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.412.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858057" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.412.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858058" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.412.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858059" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.412.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858060" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.412.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858061" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.412.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858062" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.412.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858063" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.412.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856119" version="1" comment="java-11-openjdk is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856120" version="1" comment="java-11-openjdk-demo is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856121" version="1" comment="java-11-openjdk-devel is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856122" version="1" comment="java-11-openjdk-headless is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856123" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856124" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856125" version="1" comment="java-11-openjdk-jmods is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856126" version="1" comment="java-11-openjdk-src is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856127" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.23.0.9-2.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855857" version="1" comment="firefox is &lt;115.10.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858415" version="1" comment="grub2 is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858416" version="1" comment="grub2-common is &lt;2.02-0.87.el7_9.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858417" version="1" comment="grub2-efi-ia32 is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858418" version="1" comment="grub2-efi-ia32-cdboot is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858419" version="1" comment="grub2-efi-ia32-modules is &lt;2.02-0.87.el7_9.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858420" version="1" comment="grub2-efi-x64 is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858421" version="1" comment="grub2-efi-x64-cdboot is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858422" version="1" comment="grub2-efi-x64-modules is &lt;2.02-0.87.el7_9.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858423" version="1" comment="grub2-pc is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858424" version="1" comment="grub2-pc-modules is &lt;2.02-0.87.el7_9.14 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858425" version="1" comment="grub2-tools is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858426" version="1" comment="grub2-tools-extra is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858427" version="1" comment="grub2-tools-minimal is &lt;2.02-0.87.el7_9.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858640" version="1" comment="bpftool is &lt;3.10.0-1160.118.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858641" version="1" comment="kernel is &lt;3.10.0-1160.118.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858642" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.118.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858643" version="1" comment="kernel-debug is &lt;3.10.0-1160.118.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858646" version="1" comment="kernel-doc is &lt;3.10.0-1160.118.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858647" version="1" comment="kernel-headers is &lt;3.10.0-1160.118.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858648" version="1" comment="kernel-tools is &lt;3.10.0-1160.118.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858649" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.118.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858651" version="1" comment="perf is &lt;3.10.0-1160.118.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858652" version="1" comment="python-perf is &lt;3.10.0-1160.118.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858653" version="1" comment="tigervnc is &lt;1.8.0-33.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858654" version="1" comment="tigervnc-icons is &lt;1.8.0-33.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858655" version="1" comment="tigervnc-license is &lt;1.8.0-33.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858656" version="1" comment="tigervnc-server is &lt;1.8.0-33.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858657" version="1" comment="tigervnc-server-applet is &lt;1.8.0-33.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858658" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-33.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858659" version="1" comment="tigervnc-server-module is &lt;1.8.0-33.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863197" version="1" comment="firefox is &lt;115.11.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863198" version="1" comment="thunderbird is &lt;115.11.0-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865873" version="1" comment="glibc is &lt;2.17-326.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865874" version="1" comment="glibc-common is &lt;2.17-326.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865875" version="1" comment="glibc-devel is &lt;2.17-326.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865876" version="1" comment="glibc-headers is &lt;2.17-326.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865877" version="1" comment="glibc-static is &lt;2.17-326.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865878" version="1" comment="glibc-utils is &lt;2.17-326.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865879" version="1" comment="nscd is &lt;2.17-326.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865172" version="1" comment="389-ds-base is &lt;1.3.11.1-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865173" version="1" comment="389-ds-base-devel is &lt;1.3.11.1-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865174" version="1" comment="389-ds-base-libs is &lt;1.3.11.1-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865175" version="1" comment="389-ds-base-snmp is &lt;1.3.11.1-5.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865176" version="1" comment="less is &lt;458-10.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865880" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865881" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865882" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865883" version="1" comment="bind-dyndb-ldap is &lt;11.1-7.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865884" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865885" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865886" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865887" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865888" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865889" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865890" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865891" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865892" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865893" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865894" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865895" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865896" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.16 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865897" version="1" comment="dhclient is &lt;4.2.5-83.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865898" version="1" comment="dhcp is &lt;4.2.5-83.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865899" version="1" comment="dhcp-common is &lt;4.2.5-83.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865900" version="1" comment="dhcp-devel is &lt;4.2.5-83.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865901" version="1" comment="dhcp-libs is &lt;4.2.5-83.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865902" version="1" comment="ipa-client is &lt;4.6.8-5.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865903" version="1" comment="ipa-client-common is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865904" version="1" comment="ipa-common is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865905" version="1" comment="ipa-python-compat is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865906" version="1" comment="ipa-server is &lt;4.6.8-5.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865907" version="1" comment="ipa-server-common is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865908" version="1" comment="ipa-server-dns is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865909" version="1" comment="ipa-server-trust-ad is &lt;4.6.8-5.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865910" version="1" comment="python2-ipaclient is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865911" version="1" comment="python2-ipalib is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865912" version="1" comment="python2-ipaserver is &lt;4.6.8-5.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867116" version="1" comment="iwl100-firmware is &lt;39.31.5.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867117" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867118" version="1" comment="iwl105-firmware is &lt;18.168.6.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867119" version="1" comment="iwl135-firmware is &lt;18.168.6.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867120" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867121" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867122" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867123" version="1" comment="iwl3945-firmware is &lt;15.32.2.9-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867124" version="1" comment="iwl4965-firmware is &lt;228.61.2.24-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867125" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867126" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867127" version="1" comment="iwl6000-firmware is &lt;9.221.4.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867128" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867129" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867130" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867131" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-83.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867132" version="1" comment="linux-firmware is &lt;20200421-83.git78c0348.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870202" version="1" comment="firefox is &lt;115.12.0-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868190" version="1" comment="flatpak is &lt;1.0.9-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868191" version="1" comment="flatpak-builder is &lt;1.0.0-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868192" version="1" comment="flatpak-devel is &lt;1.0.9-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868193" version="1" comment="flatpak-libs is &lt;1.0.9-13.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869887" version="1" comment="thunderbird is &lt;115.12.1-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873474" version="1" comment="pki-base is &lt;10.5.18-32.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873475" version="1" comment="pki-base-java is &lt;10.5.18-32.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873476" version="1" comment="pki-ca is &lt;10.5.18-32.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873477" version="1" comment="pki-javadoc is &lt;10.5.18-32.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873478" version="1" comment="pki-kra is &lt;10.5.18-32.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873479" version="1" comment="pki-server is &lt;10.5.18-32.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873480" version="1" comment="pki-symkey is &lt;10.5.18-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873481" version="1" comment="pki-tools is &lt;10.5.18-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877712" version="1" comment="ghostscript is &lt;9.25-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877713" version="1" comment="ghostscript-cups is &lt;9.25-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877714" version="1" comment="ghostscript-doc is &lt;9.25-5.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877715" version="1" comment="ghostscript-gtk is &lt;9.25-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877716" version="1" comment="libgs is &lt;9.25-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877717" version="1" comment="libgs-devel is &lt;9.25-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941589" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.422.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941590" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.422.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941591" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.422.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941592" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.422.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941593" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.422.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941594" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.422.b05-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941595" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.422.b05-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941596" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.422.b05-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880848" version="1" comment="java-11-openjdk is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880849" version="1" comment="java-11-openjdk-demo is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880850" version="1" comment="java-11-openjdk-devel is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880851" version="1" comment="java-11-openjdk-headless is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880852" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880853" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880854" version="1" comment="java-11-openjdk-jmods is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880855" version="1" comment="java-11-openjdk-src is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880856" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.24.0.8-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944418" version="1" comment="qt5-qtbase is &lt;5.9.7-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944419" version="1" comment="qt5-qtbase-common is &lt;5.9.7-6.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944420" version="1" comment="qt5-qtbase-devel is &lt;5.9.7-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944421" version="1" comment="qt5-qtbase-doc is &lt;5.9.7-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944422" version="1" comment="qt5-qtbase-examples is &lt;5.9.7-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944423" version="1" comment="qt5-qtbase-gui is &lt;5.9.7-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944424" version="1" comment="qt5-qtbase-mysql is &lt;5.9.7-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944425" version="1" comment="qt5-qtbase-odbc is &lt;5.9.7-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944426" version="1" comment="qt5-qtbase-postgresql is &lt;5.9.7-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944427" version="1" comment="qt5-qtbase-static is &lt;5.9.7-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944428" version="1" comment="qt5-rpm-macros is &lt;5.9.7-6.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880203" version="1" comment="krb5-devel is &lt;1.15.1-55.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880204" version="1" comment="krb5-libs is &lt;1.15.1-55.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880205" version="1" comment="krb5-pkinit is &lt;1.15.1-55.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880206" version="1" comment="krb5-server is &lt;1.15.1-55.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880207" version="1" comment="krb5-server-ldap is &lt;1.15.1-55.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880208" version="1" comment="krb5-workstation is &lt;1.15.1-55.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880209" version="1" comment="libkadm5 is &lt;1.15.1-55.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942744" version="1" comment="389-ds-base is &lt;1.3.11.1-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942745" version="1" comment="389-ds-base-devel is &lt;1.3.11.1-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942746" version="1" comment="389-ds-base-libs is &lt;1.3.11.1-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942747" version="1" comment="389-ds-base-snmp is &lt;1.3.11.1-6.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942748" version="1" comment="flatpak is &lt;1.0.9-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942749" version="1" comment="flatpak-builder is &lt;1.0.0-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942750" version="1" comment="flatpak-devel is &lt;1.0.9-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942751" version="1" comment="flatpak-libs is &lt;1.0.9-15.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942557" version="1" comment="python3-setuptools is &lt;39.2.0-10.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942558" version="1" comment="python-setuptools is &lt;0.9.8-7.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945459" version="1" comment="bpftool is &lt;3.10.0-1160.125.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945460" version="1" comment="kernel is &lt;3.10.0-1160.125.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945461" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.125.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945462" version="1" comment="kernel-debug is &lt;3.10.0-1160.125.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945465" version="1" comment="kernel-doc is &lt;3.10.0-1160.125.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945466" version="1" comment="kernel-headers is &lt;3.10.0-1160.125.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945467" version="1" comment="kernel-tools is &lt;3.10.0-1160.125.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945468" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.125.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945470" version="1" comment="perf is &lt;3.10.0-1160.125.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945471" version="1" comment="python-perf is &lt;3.10.0-1160.125.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945525" version="1" comment="389-ds-base is &lt;1.3.11.1-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945526" version="1" comment="389-ds-base-devel is &lt;1.3.11.1-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945527" version="1" comment="389-ds-base-libs is &lt;1.3.11.1-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945528" version="1" comment="389-ds-base-snmp is &lt;1.3.11.1-7.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947248" version="1" comment="cups-filters is &lt;1.0.35-29.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947249" version="1" comment="cups-filters-devel is &lt;1.0.35-29.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947250" version="1" comment="cups-filters-libs is &lt;1.0.35-29.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948422" version="1" comment="libgudev1 is &lt;219-78.el7_9.11 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948423" version="1" comment="libgudev1-devel is &lt;219-78.el7_9.11 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948424" version="1" comment="systemd is &lt;219-78.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948425" version="1" comment="systemd-devel is &lt;219-78.el7_9.11 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948426" version="1" comment="systemd-journal-gateway is &lt;219-78.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948427" version="1" comment="systemd-libs is &lt;219-78.el7_9.11 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948428" version="1" comment="systemd-networkd is &lt;219-78.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948429" version="1" comment="systemd-python is &lt;219-78.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948430" version="1" comment="systemd-resolved is &lt;219-78.el7_9.11 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948431" version="1" comment="systemd-sysv is &lt;219-78.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953315" version="1" comment="NetworkManager-libreswan is &lt;1.2.4-4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953316" version="1" comment="NetworkManager-libreswan-gnome is &lt;1.2.4-4.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950985" version="1" comment="python-idna is &lt;2.4-2.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953508" version="1" comment="postgresql is &lt;9.2.24-9.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953509" version="1" comment="postgresql-contrib is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953510" version="1" comment="postgresql-devel is &lt;9.2.24-9.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953511" version="1" comment="postgresql-docs is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953512" version="1" comment="postgresql-libs is &lt;9.2.24-9.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953513" version="1" comment="postgresql-plperl is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953514" version="1" comment="postgresql-plpython is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953515" version="1" comment="postgresql-pltcl is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953516" version="1" comment="postgresql-server is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953517" version="1" comment="postgresql-static is &lt;9.2.24-9.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953518" version="1" comment="postgresql-test is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953519" version="1" comment="postgresql-upgrade is &lt;9.2.24-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956539" version="1" comment="krb5-devel is &lt;1.15.1-55.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956540" version="1" comment="krb5-libs is &lt;1.15.1-55.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956541" version="1" comment="krb5-pkinit is &lt;1.15.1-55.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956542" version="1" comment="krb5-server is &lt;1.15.1-55.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956543" version="1" comment="krb5-server-ldap is &lt;1.15.1-55.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956544" version="1" comment="krb5-workstation is &lt;1.15.1-55.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956545" version="1" comment="libkadm5 is &lt;1.15.1-55.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960784" version="1" comment="xerces-c is &lt;3.1.1-10.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960785" version="1" comment="xerces-c-devel is &lt;3.1.1-10.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960786" version="1" comment="xerces-c-doc is &lt;3.1.1-10.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955234" version="1" comment="libsoup is &lt;2.62.2-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955235" version="1" comment="libsoup-devel is &lt;2.62.2-3.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957237" version="1" comment="squid is &lt;3.5.20-17.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957238" version="1" comment="squid-migration-script is &lt;3.5.20-17.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957239" version="1" comment="squid-sysvinit is &lt;3.5.20-17.el7_9.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958984" version="1" comment="tigervnc is &lt;1.8.0-34.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958985" version="1" comment="tigervnc-icons is &lt;1.8.0-34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958986" version="1" comment="tigervnc-license is &lt;1.8.0-34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958987" version="1" comment="tigervnc-server is &lt;1.8.0-34.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958988" version="1" comment="tigervnc-server-applet is &lt;1.8.0-34.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958989" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-34.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958990" version="1" comment="tigervnc-server-module is &lt;1.8.0-34.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961524" version="1" comment="raptor2 is &lt;2.0.9-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961525" version="1" comment="raptor2-devel is &lt;2.0.9-5.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961526" version="1" comment="iperf3 is &lt;3.1.7-3.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961527" version="1" comment="iperf3-devel is &lt;3.1.7-3.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962649" version="1" comment="rsync is &lt;3.1.2-12.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999889" version="1" comment="microcode_ctl is &lt;2.1-73.24.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007991" version="1" comment="glibc is &lt;2.17-326.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007992" version="1" comment="glibc-common is &lt;2.17-326.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007993" version="1" comment="glibc-devel is &lt;2.17-326.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007994" version="1" comment="glibc-headers is &lt;2.17-326.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007995" version="1" comment="glibc-static is &lt;2.17-326.el7_9.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007996" version="1" comment="glibc-utils is &lt;2.17-326.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007997" version="1" comment="nscd is &lt;2.17-326.el7_9.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009433" version="1" comment="pam is &lt;1.1.8-23.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009434" version="1" comment="pam-devel is &lt;1.1.8-23.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009435" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009436" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009437" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009438" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009439" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009440" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009441" version="1" comment="xorg-x11-server-common is &lt;1.20.4-32.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009442" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-32.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009443" version="1" comment="xorg-x11-server-source is &lt;1.20.4-32.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009444" version="1" comment="tigervnc is &lt;1.8.0-36.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009445" version="1" comment="tigervnc-icons is &lt;1.8.0-36.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009446" version="1" comment="tigervnc-license is &lt;1.8.0-36.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009447" version="1" comment="tigervnc-server is &lt;1.8.0-36.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009448" version="1" comment="tigervnc-server-applet is &lt;1.8.0-36.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009449" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-36.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009450" version="1" comment="tigervnc-server-module is &lt;1.8.0-36.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042371" version="1" comment="libblockdev is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042372" version="1" comment="libblockdev-btrfs is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042373" version="1" comment="libblockdev-btrfs-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042374" version="1" comment="libblockdev-crypto is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042375" version="1" comment="libblockdev-crypto-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042376" version="1" comment="libblockdev-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042377" version="1" comment="libblockdev-dm is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042378" version="1" comment="libblockdev-dm-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042379" version="1" comment="libblockdev-fs is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042380" version="1" comment="libblockdev-fs-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042381" version="1" comment="libblockdev-kbd is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042382" version="1" comment="libblockdev-kbd-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042383" version="1" comment="libblockdev-loop is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042384" version="1" comment="libblockdev-loop-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042385" version="1" comment="libblockdev-lvm is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042386" version="1" comment="libblockdev-lvm-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042387" version="1" comment="libblockdev-mdraid is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042388" version="1" comment="libblockdev-mdraid-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042389" version="1" comment="libblockdev-mpath is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042390" version="1" comment="libblockdev-mpath-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042391" version="1" comment="libblockdev-nvdimm is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042392" version="1" comment="libblockdev-nvdimm-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042393" version="1" comment="libblockdev-part is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042394" version="1" comment="libblockdev-part-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042395" version="1" comment="libblockdev-plugins-all is &lt;2.18-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042396" version="1" comment="libblockdev-swap is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042397" version="1" comment="libblockdev-swap-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042398" version="1" comment="libblockdev-utils is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042399" version="1" comment="libblockdev-utils-devel is &lt;2.18-5.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042400" version="1" comment="libblockdev-vdo is &lt;2.18-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042401" version="1" comment="libblockdev-vdo-devel is &lt;2.18-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042402" version="1" comment="python2-blockdev is &lt;2.18-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010142" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.462.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010143" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.462.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010144" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.462.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010145" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.462.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010146" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.462.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010147" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.462.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010148" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.462.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010149" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.462.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011414" version="1" comment="java-11-openjdk is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011166" version="1" comment="java-11-openjdk-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011415" version="1" comment="java-11-openjdk-demo is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011168" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011169" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011170" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011416" version="1" comment="java-11-openjdk-devel is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011172" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011173" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011174" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011175" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011417" version="1" comment="java-11-openjdk-headless is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011177" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011178" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011179" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011418" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011181" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011419" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011183" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011420" version="1" comment="java-11-openjdk-jmods is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011185" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011186" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011187" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011188" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011421" version="1" comment="java-11-openjdk-src is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011190" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011191" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011192" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011422" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011194" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011195" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011196" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006275" version="1" comment="sudo is &lt;1.8.23-10.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006276" version="1" comment="sudo-devel is &lt;1.8.23-10.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008281" version="1" comment="bpftool is &lt;3.10.0-1160.136.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008282" version="1" comment="kernel is &lt;3.10.0-1160.136.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008283" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.136.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008284" version="1" comment="kernel-debug is &lt;3.10.0-1160.136.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008287" version="1" comment="kernel-doc is &lt;3.10.0-1160.136.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008288" version="1" comment="kernel-headers is &lt;3.10.0-1160.136.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008289" version="1" comment="kernel-tools is &lt;3.10.0-1160.136.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008290" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.136.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008292" version="1" comment="perf is &lt;3.10.0-1160.136.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008293" version="1" comment="python-perf is &lt;3.10.0-1160.136.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014484" version="1" comment="python3-setuptools is &lt;39.2.0-10.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014485" version="1" comment="emacs-git is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014486" version="1" comment="emacs-git-el is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014487" version="1" comment="git is &lt;1.8.3.1-25.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014488" version="1" comment="git-all is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014489" version="1" comment="git-bzr is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014490" version="1" comment="git-cvs is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014491" version="1" comment="git-daemon is &lt;1.8.3.1-25.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014492" version="1" comment="git-email is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014493" version="1" comment="git-gnome-keyring is &lt;1.8.3.1-25.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014494" version="1" comment="git-gui is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014495" version="1" comment="git-hg is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014496" version="1" comment="git-instaweb is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014497" version="1" comment="git-p4 is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014498" version="1" comment="git-svn is &lt;1.8.3.1-25.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014499" version="1" comment="gitk is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014500" version="1" comment="gitweb is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014501" version="1" comment="perl-Git is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014502" version="1" comment="perl-Git-SVN is &lt;1.8.3.1-25.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013083" version="1" comment="python-setuptools is &lt;0.9.8-7.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011938" version="1" comment="libxml2 is &lt;2.9.1-6.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011939" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011940" version="1" comment="libxml2-python is &lt;2.9.1-6.el7_9.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011941" version="1" comment="libxml2-static is &lt;2.9.1-6.el7_9.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011942" version="1" comment="konsole is &lt;4.10.5-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011943" version="1" comment="konsole-part is &lt;4.10.5-5.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012367" version="1" comment="lemon is &lt;3.7.17-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012368" version="1" comment="sqlite is &lt;3.7.17-9.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012369" version="1" comment="sqlite-devel is &lt;3.7.17-9.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012370" version="1" comment="sqlite-doc is &lt;3.7.17-9.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012371" version="1" comment="sqlite-tcl is &lt;3.7.17-9.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964798" version="1" comment="python-jinja2 is &lt;2.7.2-5.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964251" version="1" comment="bpftool is &lt;3.10.0-1160.132.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964252" version="1" comment="kernel is &lt;3.10.0-1160.132.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964253" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.132.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964254" version="1" comment="kernel-debug is &lt;3.10.0-1160.132.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964257" version="1" comment="kernel-doc is &lt;3.10.0-1160.132.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964258" version="1" comment="kernel-headers is &lt;3.10.0-1160.132.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964259" version="1" comment="kernel-tools is &lt;3.10.0-1160.132.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964260" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.132.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964262" version="1" comment="perf is &lt;3.10.0-1160.132.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964263" version="1" comment="python-perf is &lt;3.10.0-1160.132.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963881" version="1" comment="krb5-devel is &lt;1.15.1-55.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963882" version="1" comment="krb5-libs is &lt;1.15.1-55.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963883" version="1" comment="krb5-pkinit is &lt;1.15.1-55.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963884" version="1" comment="krb5-server is &lt;1.15.1-55.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963885" version="1" comment="krb5-server-ldap is &lt;1.15.1-55.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963886" version="1" comment="krb5-workstation is &lt;1.15.1-55.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963887" version="1" comment="libkadm5 is &lt;1.15.1-55.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018317" version="1" comment="libxml2 is &lt;2.9.1-6.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018318" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018319" version="1" comment="libxml2-python is &lt;2.9.1-6.el7_9.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018320" version="1" comment="libxml2-static is &lt;2.9.1-6.el7_9.13 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016960" version="1" comment="bpftool is &lt;3.10.0-1160.137.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016961" version="1" comment="kernel is &lt;3.10.0-1160.137.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016962" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.137.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016963" version="1" comment="kernel-debug is &lt;3.10.0-1160.137.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016966" version="1" comment="kernel-doc is &lt;3.10.0-1160.137.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016967" version="1" comment="kernel-headers is &lt;3.10.0-1160.137.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016968" version="1" comment="kernel-tools is &lt;3.10.0-1160.137.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016969" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.137.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016971" version="1" comment="perf is &lt;3.10.0-1160.137.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016972" version="1" comment="python-perf is &lt;3.10.0-1160.137.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020503" version="1" comment="bsdcpio is &lt;3.1.2-14.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020504" version="1" comment="bsdtar is &lt;3.1.2-14.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020505" version="1" comment="libarchive is &lt;3.1.2-14.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020506" version="1" comment="libarchive-devel is &lt;3.1.2-14.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017107" version="1" comment="bpftool is &lt;3.10.0-1160.138.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017108" version="1" comment="kernel is &lt;3.10.0-1160.138.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017109" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.138.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017110" version="1" comment="kernel-debug is &lt;3.10.0-1160.138.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017113" version="1" comment="kernel-doc is &lt;3.10.0-1160.138.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017114" version="1" comment="kernel-headers is &lt;3.10.0-1160.138.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017115" version="1" comment="kernel-tools is &lt;3.10.0-1160.138.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017116" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.138.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017118" version="1" comment="perf is &lt;3.10.0-1160.138.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017119" version="1" comment="python-perf is &lt;3.10.0-1160.138.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017223" version="1" comment="httpd is &lt;2.4.6-99.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017224" version="1" comment="httpd-devel is &lt;2.4.6-99.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017225" version="1" comment="httpd-manual is &lt;2.4.6-99.el7_9.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017226" version="1" comment="httpd-tools is &lt;2.4.6-99.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017227" version="1" comment="mod_ldap is &lt;2.4.6-99.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017228" version="1" comment="mod_proxy_html is &lt;2.4.6-99.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017229" version="1" comment="mod_session is &lt;2.4.6-99.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017230" version="1" comment="mod_ssl is &lt;2.4.6-99.el7_9.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017231" version="1" comment="pam is &lt;1.1.8-23.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017232" version="1" comment="pam-devel is &lt;1.1.8-23.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017846" version="1" comment="bpftool is &lt;3.10.0-1160.139.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017847" version="1" comment="kernel is &lt;3.10.0-1160.139.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017848" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.139.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017849" version="1" comment="kernel-debug is &lt;3.10.0-1160.139.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017852" version="1" comment="kernel-doc is &lt;3.10.0-1160.139.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017853" version="1" comment="kernel-headers is &lt;3.10.0-1160.139.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017854" version="1" comment="kernel-tools is &lt;3.10.0-1160.139.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017855" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.139.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017857" version="1" comment="perf is &lt;3.10.0-1160.139.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017858" version="1" comment="python-perf is &lt;3.10.0-1160.139.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967089" version="1" comment="cpp is &lt;4.8.5-45.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967090" version="1" comment="gcc is &lt;4.8.5-45.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967091" version="1" comment="gcc-c++ is &lt;4.8.5-45.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967092" version="1" comment="gcc-gfortran is &lt;4.8.5-45.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967093" version="1" comment="gcc-gnat is &lt;4.8.5-45.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967094" version="1" comment="gcc-go is &lt;4.8.5-45.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967095" version="1" comment="gcc-objc is &lt;4.8.5-45.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967096" version="1" comment="gcc-objc++ is &lt;4.8.5-45.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967097" version="1" comment="gcc-plugin-devel is &lt;4.8.5-45.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967098" version="1" comment="libasan is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967099" version="1" comment="libasan-static is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967100" version="1" comment="libatomic is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967101" version="1" comment="libatomic-static is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967102" version="1" comment="libgcc is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967103" version="1" comment="libgfortran is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967104" version="1" comment="libgfortran-static is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967105" version="1" comment="libgnat is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967106" version="1" comment="libgnat-devel is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967107" version="1" comment="libgnat-static is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967108" version="1" comment="libgo is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967109" version="1" comment="libgo-devel is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967110" version="1" comment="libgo-static is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967111" version="1" comment="libgomp is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967112" version="1" comment="libitm is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967113" version="1" comment="libitm-devel is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967114" version="1" comment="libitm-static is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967115" version="1" comment="libmudflap is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967116" version="1" comment="libmudflap-devel is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967117" version="1" comment="libmudflap-static is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967118" version="1" comment="libobjc is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967119" version="1" comment="libquadmath is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967120" version="1" comment="libquadmath-devel is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967121" version="1" comment="libquadmath-static is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967122" version="1" comment="libstdc++ is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967123" version="1" comment="libstdc++-devel is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967124" version="1" comment="libstdc++-docs is &lt;4.8.5-45.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967125" version="1" comment="libstdc++-static is &lt;4.8.5-45.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967126" version="1" comment="libtsan is &lt;4.8.5-45.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967127" version="1" comment="libtsan-static is &lt;4.8.5-45.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020296" version="1" comment="postgresql is &lt;9.2.24-9.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020297" version="1" comment="postgresql-contrib is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020298" version="1" comment="postgresql-devel is &lt;9.2.24-9.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020299" version="1" comment="postgresql-docs is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020300" version="1" comment="postgresql-libs is &lt;9.2.24-9.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020301" version="1" comment="postgresql-plperl is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020302" version="1" comment="postgresql-plpython is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020303" version="1" comment="postgresql-pltcl is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020304" version="1" comment="postgresql-server is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020305" version="1" comment="postgresql-static is &lt;9.2.24-9.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020306" version="1" comment="postgresql-test is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020307" version="1" comment="postgresql-upgrade is &lt;9.2.24-9.el7_9.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022020" version="1" comment="cups is &lt;1.6.3-52.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022021" version="1" comment="cups-client is &lt;1.6.3-52.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022022" version="1" comment="cups-devel is &lt;1.6.3-52.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022023" version="1" comment="cups-filesystem is &lt;1.6.3-52.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022024" version="1" comment="cups-ipptool is &lt;1.6.3-52.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022025" version="1" comment="cups-libs is &lt;1.6.3-52.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022026" version="1" comment="cups-lpd is &lt;1.6.3-52.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022317" version="1" comment="bpftool is &lt;3.10.0-1160.141.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022318" version="1" comment="kernel is &lt;3.10.0-1160.141.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022319" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.141.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022320" version="1" comment="kernel-debug is &lt;3.10.0-1160.141.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022323" version="1" comment="kernel-doc is &lt;3.10.0-1160.141.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022324" version="1" comment="kernel-headers is &lt;3.10.0-1160.141.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022325" version="1" comment="kernel-tools is &lt;3.10.0-1160.141.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022326" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.141.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022328" version="1" comment="perf is &lt;3.10.0-1160.141.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022329" version="1" comment="python-perf is &lt;3.10.0-1160.141.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966015" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966016" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966017" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966018" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966019" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966020" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966021" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966022" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.18 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966023" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966024" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966025" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966026" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.18 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966027" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966028" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966029" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966030" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024098" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.472.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024099" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.472.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024100" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.472.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024101" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.472.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024102" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.472.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024103" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.472.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024104" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.472.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024105" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.472.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025669" version="1" comment="java-11-openjdk is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025494" version="1" comment="java-11-openjdk-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025670" version="1" comment="java-11-openjdk-demo is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025496" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025497" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025498" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025671" version="1" comment="java-11-openjdk-devel is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025500" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025501" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025502" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025503" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025672" version="1" comment="java-11-openjdk-headless is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025505" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025506" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025507" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025673" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025509" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025674" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025511" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025675" version="1" comment="java-11-openjdk-jmods is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025513" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025514" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025515" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025516" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025676" version="1" comment="java-11-openjdk-src is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025518" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025519" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025520" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025677" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025522" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025523" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025524" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047003" version="1" comment="libipa_hbac is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047004" version="1" comment="libipa_hbac-devel is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047005" version="1" comment="libsss_autofs is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047006" version="1" comment="libsss_certmap is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047007" version="1" comment="libsss_certmap-devel is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047008" version="1" comment="libsss_idmap is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047009" version="1" comment="libsss_idmap-devel is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047010" version="1" comment="libsss_nss_idmap is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047011" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047012" version="1" comment="libsss_simpleifp is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047013" version="1" comment="libsss_simpleifp-devel is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047014" version="1" comment="libsss_sudo is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047015" version="1" comment="python-libipa_hbac is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047016" version="1" comment="python-libsss_nss_idmap is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047017" version="1" comment="python-sss is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047018" version="1" comment="python-sss-murmur is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047019" version="1" comment="python-sssdconfig is &lt;1.16.5-10.el7_9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047020" version="1" comment="sssd is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047021" version="1" comment="sssd-ad is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047022" version="1" comment="sssd-client is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047023" version="1" comment="sssd-common is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047024" version="1" comment="sssd-common-pac is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047025" version="1" comment="sssd-dbus is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047026" version="1" comment="sssd-ipa is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047027" version="1" comment="sssd-kcm is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047028" version="1" comment="sssd-krb5 is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047029" version="1" comment="sssd-krb5-common is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047030" version="1" comment="sssd-ldap is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047031" version="1" comment="sssd-libwbclient is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047032" version="1" comment="sssd-libwbclient-devel is &lt;1.16.5-10.el7_9.17 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047033" version="1" comment="sssd-polkit-rules is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047034" version="1" comment="sssd-proxy is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047035" version="1" comment="sssd-tools is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047036" version="1" comment="sssd-winbind-idmap is &lt;1.16.5-10.el7_9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032439" version="1" comment="bpftool is &lt;3.10.0-1160.142.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032440" version="1" comment="kernel is &lt;3.10.0-1160.142.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032441" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.142.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032442" version="1" comment="kernel-debug is &lt;3.10.0-1160.142.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032445" version="1" comment="kernel-doc is &lt;3.10.0-1160.142.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032446" version="1" comment="kernel-headers is &lt;3.10.0-1160.142.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032447" version="1" comment="kernel-tools is &lt;3.10.0-1160.142.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032448" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.142.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032450" version="1" comment="perf is &lt;3.10.0-1160.142.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032451" version="1" comment="python-perf is &lt;3.10.0-1160.142.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968226" version="1" comment="emacs is &lt;24.3-23.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968227" version="1" comment="emacs-common is &lt;24.3-23.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968228" version="1" comment="emacs-el is &lt;24.3-23.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968229" version="1" comment="emacs-filesystem is &lt;24.3-23.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968230" version="1" comment="emacs-nox is &lt;24.3-23.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968231" version="1" comment="emacs-terminal is &lt;24.3-23.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031899" version="1" comment="tigervnc is &lt;1.8.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031900" version="1" comment="tigervnc-icons is &lt;1.8.0-36.el7_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031901" version="1" comment="tigervnc-license is &lt;1.8.0-36.el7_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031902" version="1" comment="tigervnc-server is &lt;1.8.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031903" version="1" comment="tigervnc-server-applet is &lt;1.8.0-36.el7_9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031904" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031905" version="1" comment="tigervnc-server-module is &lt;1.8.0-36.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033792" version="1" comment="bind is &lt;9.11.4-26.P2.el7_9.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033793" version="1" comment="bind-chroot is &lt;9.11.4-26.P2.el7_9.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033794" version="1" comment="bind-devel is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033795" version="1" comment="bind-export-devel is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033796" version="1" comment="bind-export-libs is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033797" version="1" comment="bind-libs is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033798" version="1" comment="bind-libs-lite is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033799" version="1" comment="bind-license is &lt;9.11.4-26.P2.el7_9.19 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033800" version="1" comment="bind-lite-devel is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033801" version="1" comment="bind-pkcs11 is &lt;9.11.4-26.P2.el7_9.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033802" version="1" comment="bind-pkcs11-devel is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033803" version="1" comment="bind-pkcs11-libs is &lt;9.11.4-26.P2.el7_9.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033804" version="1" comment="bind-pkcs11-utils is &lt;9.11.4-26.P2.el7_9.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033805" version="1" comment="bind-sdb is &lt;9.11.4-26.P2.el7_9.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033806" version="1" comment="bind-sdb-chroot is &lt;9.11.4-26.P2.el7_9.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033807" version="1" comment="bind-utils is &lt;9.11.4-26.P2.el7_9.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037040" version="1" comment="bpftool is &lt;3.10.0-1160.143.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037041" version="1" comment="kernel is &lt;3.10.0-1160.143.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037042" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.143.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037043" version="1" comment="kernel-debug is &lt;3.10.0-1160.143.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037046" version="1" comment="kernel-doc is &lt;3.10.0-1160.143.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037047" version="1" comment="kernel-headers is &lt;3.10.0-1160.143.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037048" version="1" comment="kernel-tools is &lt;3.10.0-1160.143.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037049" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.143.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037051" version="1" comment="perf is &lt;3.10.0-1160.143.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037052" version="1" comment="python-perf is &lt;3.10.0-1160.143.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034202" version="1" comment="rsync is &lt;3.1.2-12.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037313" version="1" comment="bpftool is &lt;3.10.0-1160.144.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037314" version="1" comment="kernel is &lt;3.10.0-1160.144.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037315" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.144.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037316" version="1" comment="kernel-debug is &lt;3.10.0-1160.144.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037319" version="1" comment="kernel-doc is &lt;3.10.0-1160.144.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037320" version="1" comment="kernel-headers is &lt;3.10.0-1160.144.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037321" version="1" comment="kernel-tools is &lt;3.10.0-1160.144.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037322" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.144.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037324" version="1" comment="perf is &lt;3.10.0-1160.144.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037325" version="1" comment="python-perf is &lt;3.10.0-1160.144.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969081" version="1" comment="bpftool is &lt;3.10.0-1160.133.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969082" version="1" comment="kernel is &lt;3.10.0-1160.133.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969083" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.133.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969084" version="1" comment="kernel-debug is &lt;3.10.0-1160.133.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969087" version="1" comment="kernel-doc is &lt;3.10.0-1160.133.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969088" version="1" comment="kernel-headers is &lt;3.10.0-1160.133.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969089" version="1" comment="kernel-tools is &lt;3.10.0-1160.133.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969090" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.133.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969092" version="1" comment="perf is &lt;3.10.0-1160.133.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969093" version="1" comment="python-perf is &lt;3.10.0-1160.133.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969739" version="1" comment="libxml2 is &lt;2.9.1-6.el7_9.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969740" version="1" comment="libxml2-devel is &lt;2.9.1-6.el7_9.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969741" version="1" comment="libxml2-python is &lt;2.9.1-6.el7_9.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969742" version="1" comment="libxml2-static is &lt;2.9.1-6.el7_9.9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968232" version="1" comment="tigervnc is &lt;1.8.0-36.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968233" version="1" comment="tigervnc-icons is &lt;1.8.0-36.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968234" version="1" comment="tigervnc-license is &lt;1.8.0-36.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968235" version="1" comment="tigervnc-server is &lt;1.8.0-36.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968236" version="1" comment="tigervnc-server-applet is &lt;1.8.0-36.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968237" version="1" comment="tigervnc-server-minimal is &lt;1.8.0-36.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968238" version="1" comment="tigervnc-server-module is &lt;1.8.0-36.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968239" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.4-30.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968240" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.4-30.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968241" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.4-30.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968242" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.4-30.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968243" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.4-30.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968244" version="1" comment="xorg-x11-server-Xwayland is &lt;1.20.4-30.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968245" version="1" comment="xorg-x11-server-common is &lt;1.20.4-30.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968246" version="1" comment="xorg-x11-server-devel is &lt;1.20.4-30.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968247" version="1" comment="xorg-x11-server-source is &lt;1.20.4-30.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974858" version="1" comment="libxslt is &lt;1.1.28-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974859" version="1" comment="libxslt-devel is &lt;1.1.28-8.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974860" version="1" comment="libxslt-python is &lt;1.1.28-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977524" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.452.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977525" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.452.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977526" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.452.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977527" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.452.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977528" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.452.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977529" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.452.b09-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977530" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.452.b09-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977531" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.452.b09-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999610" version="1" comment="java-11-openjdk is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999549" version="1" comment="java-11-openjdk-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999611" version="1" comment="java-11-openjdk-demo is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999551" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999552" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999553" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999612" version="1" comment="java-11-openjdk-devel is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999555" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999556" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999557" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999558" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999613" version="1" comment="java-11-openjdk-headless is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999560" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999561" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999562" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999614" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999564" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999615" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999566" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999616" version="1" comment="java-11-openjdk-jmods is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999568" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999569" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999570" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999571" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999617" version="1" comment="java-11-openjdk-src is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999573" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999574" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999575" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999618" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999577" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999578" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999579" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976240" version="1" comment="bpftool is &lt;3.10.0-1160.134.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976241" version="1" comment="kernel is &lt;3.10.0-1160.134.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976242" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.134.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976243" version="1" comment="kernel-debug is &lt;3.10.0-1160.134.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976246" version="1" comment="kernel-doc is &lt;3.10.0-1160.134.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976247" version="1" comment="kernel-headers is &lt;3.10.0-1160.134.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976248" version="1" comment="kernel-tools is &lt;3.10.0-1160.134.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976249" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.134.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976251" version="1" comment="perf is &lt;3.10.0-1160.134.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976252" version="1" comment="python-perf is &lt;3.10.0-1160.134.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986602" version="1" comment="postgresql is &lt;9.2.24-9.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986603" version="1" comment="postgresql-contrib is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986604" version="1" comment="postgresql-devel is &lt;9.2.24-9.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986605" version="1" comment="postgresql-docs is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986606" version="1" comment="postgresql-libs is &lt;9.2.24-9.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986607" version="1" comment="postgresql-plperl is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986608" version="1" comment="postgresql-plpython is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986609" version="1" comment="postgresql-pltcl is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986610" version="1" comment="postgresql-server is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986611" version="1" comment="postgresql-static is &lt;9.2.24-9.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986612" version="1" comment="postgresql-test is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986613" version="1" comment="postgresql-upgrade is &lt;9.2.24-9.el7_9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985775" version="1" comment="virtuoso-opensource is &lt;6.1.6-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985776" version="1" comment="virtuoso-opensource-utils is &lt;6.1.6-8.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983821" version="1" comment="bpftool is &lt;3.10.0-1160.135.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983822" version="1" comment="kernel is &lt;3.10.0-1160.135.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983823" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.135.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983824" version="1" comment="kernel-debug is &lt;3.10.0-1160.135.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983827" version="1" comment="kernel-doc is &lt;3.10.0-1160.135.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983828" version="1" comment="kernel-headers is &lt;3.10.0-1160.135.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983829" version="1" comment="kernel-tools is &lt;3.10.0-1160.135.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983830" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.135.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983832" version="1" comment="perf is &lt;3.10.0-1160.135.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983833" version="1" comment="python-perf is &lt;3.10.0-1160.135.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985929" version="1" comment="minizip is &lt;1.2.7-21.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985930" version="1" comment="minizip-devel is &lt;1.2.7-21.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985931" version="1" comment="zlib is &lt;1.2.7-21.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985932" version="1" comment="zlib-devel is &lt;1.2.7-21.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985933" version="1" comment="zlib-static is &lt;1.2.7-21.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986261" version="1" comment="perl-FCGI is &lt;0.74-8.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998908" version="1" comment="libsoup is &lt;2.62.2-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998909" version="1" comment="libsoup-devel is &lt;2.62.2-6.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009451" version="1" comment="libvpx is &lt;1.3.0-8.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009452" version="1" comment="libvpx-devel is &lt;1.3.0-8.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009453" version="1" comment="libvpx-utils is &lt;1.3.0-8.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998140" version="1" comment="mpfr is &lt;3.1.1-4.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998141" version="1" comment="mpfr-devel is &lt;3.1.1-4.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014503" version="1" comment="gimp is &lt;2.8.22-1.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014504" version="1" comment="gimp-devel is &lt;2.8.22-1.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014505" version="1" comment="gimp-devel-tools is &lt;2.8.22-1.el7_9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014506" version="1" comment="gimp-libs is &lt;2.8.22-1.el7_9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998142" version="1" comment="perl-File-Find-Rule-Perl is &lt;1.13-2.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998143" version="1" comment="perl-File-Find-Rule is &lt;0.33-5.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037326" version="1" comment="perl is &lt;5.16.3-299.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037327" version="1" comment="perl-CPAN is &lt;1.9800-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037328" version="1" comment="perl-ExtUtils-CBuilder is &lt;0.28.2.6-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037329" version="1" comment="perl-ExtUtils-Embed is &lt;1.30-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037330" version="1" comment="perl-ExtUtils-Install is &lt;1.58-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037331" version="1" comment="perl-IO-Zlib is &lt;1.10-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037332" version="1" comment="perl-Locale-Maketext-Simple is &lt;0.21-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037333" version="1" comment="perl-Module-CoreList is &lt;2.76.02-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037334" version="1" comment="perl-Module-Loaded is &lt;0.08-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037335" version="1" comment="perl-Object-Accessor is &lt;0.42-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037336" version="1" comment="perl-Package-Constants is &lt;0.02-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037337" version="1" comment="perl-Pod-Escapes is &lt;1.04-299.el7_9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037338" version="1" comment="perl-Time-Piece is &lt;1.20.1-299.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037339" version="1" comment="perl-core is &lt;5.16.3-299.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037340" version="1" comment="perl-devel is &lt;5.16.3-299.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037341" version="1" comment="perl-libs is &lt;5.16.3-299.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037342" version="1" comment="perl-macros is &lt;5.16.3-299.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037343" version="1" comment="perl-tests is &lt;5.16.3-299.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039005" version="1" comment="bpftool is &lt;3.10.0-1160.145.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039006" version="1" comment="kernel is &lt;3.10.0-1160.145.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039007" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.145.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039008" version="1" comment="kernel-debug is &lt;3.10.0-1160.145.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039011" version="1" comment="kernel-doc is &lt;3.10.0-1160.145.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039012" version="1" comment="kernel-headers is &lt;3.10.0-1160.145.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039013" version="1" comment="kernel-tools is &lt;3.10.0-1160.145.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039014" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.145.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039016" version="1" comment="perf is &lt;3.10.0-1160.145.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039017" version="1" comment="python-perf is &lt;3.10.0-1160.145.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053475" version="1" comment="java-11-openjdk is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043334" version="1" comment="java-11-openjdk-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053476" version="1" comment="java-11-openjdk-demo is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043336" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053477" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053478" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053479" version="1" comment="java-11-openjdk-devel is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043340" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053480" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053481" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053482" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053483" version="1" comment="java-11-openjdk-headless is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043345" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053484" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053485" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053486" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043349" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053487" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043351" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053488" version="1" comment="java-11-openjdk-jmods is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043353" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053489" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053490" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053491" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053492" version="1" comment="java-11-openjdk-src is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043358" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053493" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053494" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053495" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043362" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053496" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053497" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041186" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.482.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041187" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.482.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041188" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.482.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041189" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.482.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041190" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.482.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041191" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.482.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041192" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.482.b08-1.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041193" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.482.b08-1.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042403" version="1" comment="bpftool is &lt;3.10.0-1160.146.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042404" version="1" comment="kernel is &lt;3.10.0-1160.146.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042405" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.146.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042406" version="1" comment="kernel-debug is &lt;3.10.0-1160.146.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042409" version="1" comment="kernel-doc is &lt;3.10.0-1160.146.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042410" version="1" comment="kernel-headers is &lt;3.10.0-1160.146.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042411" version="1" comment="kernel-tools is &lt;3.10.0-1160.146.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042412" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.146.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042414" version="1" comment="perf is &lt;3.10.0-1160.146.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042415" version="1" comment="python-perf is &lt;3.10.0-1160.146.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041693" version="1" comment="glib2 is &lt;2.56.1-11.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041694" version="1" comment="glib2-devel is &lt;2.56.1-11.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041695" version="1" comment="glib2-doc is &lt;2.56.1-11.el7_9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041696" version="1" comment="glib2-fam is &lt;2.56.1-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041697" version="1" comment="glib2-static is &lt;2.56.1-11.el7_9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041698" version="1" comment="glib2-tests is &lt;2.56.1-11.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041699" version="1" comment="openssl is &lt;1.0.2k-26.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041700" version="1" comment="openssl-devel is &lt;1.0.2k-26.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041701" version="1" comment="openssl-libs is &lt;1.0.2k-26.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041702" version="1" comment="openssl-perl is &lt;1.0.2k-26.el7_9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041703" version="1" comment="openssl-static is &lt;1.0.2k-26.el7_9.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045089" version="1" comment="python3 is &lt;3.6.8-21.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045090" version="1" comment="python3-debug is &lt;3.6.8-21.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045091" version="1" comment="python3-devel is &lt;3.6.8-21.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045092" version="1" comment="python3-idle is &lt;3.6.8-21.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045093" version="1" comment="python3-libs is &lt;3.6.8-21.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045094" version="1" comment="python3-test is &lt;3.6.8-21.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045095" version="1" comment="python3-tkinter is &lt;3.6.8-21.el7_9.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050974" version="1" comment="bpftool is &lt;3.10.0-1160.147.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050975" version="1" comment="kernel is &lt;3.10.0-1160.147.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050976" version="1" comment="kernel-abi-whitelists is &lt;3.10.0-1160.147.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050977" version="1" comment="kernel-debug is &lt;3.10.0-1160.147.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050978" version="1" comment="kernel-doc is &lt;3.10.0-1160.147.1.el7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050979" version="1" comment="kernel-headers is &lt;3.10.0-1160.147.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050980" version="1" comment="kernel-tools is &lt;3.10.0-1160.147.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050981" version="1" comment="kernel-tools-libs is &lt;3.10.0-1160.147.1.el7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050982" version="1" comment="perf is &lt;3.10.0-1160.147.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050983" version="1" comment="python-perf is &lt;3.10.0-1160.147.1.el7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050068" version="1" comment="python2-pyasn1 is &lt;0.1.9-7.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050069" version="1" comment="python2-pyasn1-modules is &lt;0.1.9-7.el7_9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052848" version="1" comment="python3 is &lt;3.6.8-21.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052849" version="1" comment="python3-debug is &lt;3.6.8-21.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052850" version="1" comment="python3-devel is &lt;3.6.8-21.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052851" version="1" comment="python3-idle is &lt;3.6.8-21.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052852" version="1" comment="python3-libs is &lt;3.6.8-21.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052853" version="1" comment="python3-test is &lt;3.6.8-21.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052854" version="1" comment="python3-tkinter is &lt;3.6.8-21.el7_9.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249633"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_proxy_html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_ssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles_es-release-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chroot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-export-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-export-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-pkcs11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-pkcs11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-pkcs11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-pkcs11-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-sdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-sdb-chroot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-keycat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh_agent_auth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-ia32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-ia32-cdboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-ia32-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-x64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-x64-cdboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-x64-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-pc-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mokutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim-ia32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim-x64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-lvm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-novolume-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-v1.10-migrator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-abi-whitelists</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-tools-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-perf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl100-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl1000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl105-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl135-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl2000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl2030-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl3160-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl3945-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl4965-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl5000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl5150-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6000g2a-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6000g2b-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6050-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl7260-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwlax2xx-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linux-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linux-nano-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen-doxywizard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype-demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>microcode_ctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.7.0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.7.0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.7.0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.7.0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.7.0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.7.0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.7.0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl098e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-dane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.6.0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.6.0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.6.0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.6.0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.6.0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-2.2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2.2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-3.0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-embedded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-embedded-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-img</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dc-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-pidl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-vfs-glusterfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-krb5-locator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-login-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-atom-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-jackson-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-jaxb-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-jaxrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-jaxrs-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-jaxrs-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-jettison-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-providers-pom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-tjws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-embedded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-mysqlnd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-process</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-recode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-pkcs11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn-freebl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn-freebl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_wsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-qt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-qt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-libdbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmjsonparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmnormalize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmsnmptrapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-fileshare-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-kdnssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-kget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-kget-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-kopete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-kopete-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-kopete-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-krdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-krdc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-krdc-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-krfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork-krfb-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-irb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-tcltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bigdecimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-io-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-minitest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-psych</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygems-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-apidocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-sign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xdmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xephyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xnest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xorg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xvfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntpdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_dav_svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-javahl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-workstation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-admintools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-trust-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cogl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cogl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cogl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slapi-nis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>setroubleshoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>setroubleshoot-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-upgrade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-clufter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kexec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kexec-tools-anaconda-addon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kexec-tools-eppic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-ccpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-kerneloops</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-pstoreoops</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-upload-watch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-vmcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-addon-xorg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-console-notification</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-gui-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-retrace-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abrt-tui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-anaconda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-plugin-bugzilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-plugin-kerneloops</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-plugin-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-plugin-mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-plugin-reportuploader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-plugin-ureport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreport-web-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ipptool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-lpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-agent-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap-servers-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs-qa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bundler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-thor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-thor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>realmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>realmd-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rest-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcf-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ModemManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ModemManager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ModemManager-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ModemManager-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ModemManager-vala</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-adsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-config-routing-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-config-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libnm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libnm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libreswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libreswan-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-team</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-tui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-wifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-wwan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>network-manager-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nm-connection-editor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libsss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sss-murmur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssdconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common-pac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-libwbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openhpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openhpi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openhpi-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cluster-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-nagios-plugins-metadata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections-testframework</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections-testframework-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-git-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-bzr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-hg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-p4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git-SVN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-common-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-common-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-accessibility-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-demo-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-devel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-headless-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-javadoc-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-src-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphite2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphite2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openchange</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openchange-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openchange-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openchange-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tdb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-mercurial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-mercurial-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial-hgk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-c++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>setroubleshoot-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-camlp4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-camlp4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-compiler-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-labltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-labltk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-ocamldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-misc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdcpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-twisted-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-inspect-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-java-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-man-pages-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-man-pages-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-rescue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-tools-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-xfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-dib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-cpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-dispatcher-routing-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl3-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnma-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkadm5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewall-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewall-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-firewall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid-migration-script</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resteasy-base-resteasy-pom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-gateway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-networkd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-resolved</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-newrole</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-restorecond</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-sandbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-authform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-authgssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-authldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-infosssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-persona</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-saml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-saml2-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsilon-tools-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-X11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-enhanced</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-python-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-ipaclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-ipalib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-ipaserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-free</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-free-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-free-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-bad-free</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-bad-free-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-javadoc-zip-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icoutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs-apidocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs-ktexteditor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb5-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drm-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXaw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXaw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libepoxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libepoxy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdev-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfontenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfontenc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwacom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwacom-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwacom-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-dri-drivers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libEGL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libEGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libGL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libGLES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libGLES-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libOSMesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libOSMesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libgbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libgbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libglapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libxatracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libxatracker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-private-llvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-private-llvm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-vulkan-drivers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vulkan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vulkan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vulkan-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xcb-proto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xkeyboard-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xkeyboard-config-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-proto-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk-fluid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-gst2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-gst2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-video-effects</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-bad-free-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc-compiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session-custom-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session-xsession</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvnc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvnc-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvncpulse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvncpulse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>authconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>authconfig-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-base-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-kra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-symkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-dvi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-gcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-gcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-gnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-hid2hci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-terminal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-kcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-polkit-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-winbind-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl7265-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcab1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcab1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-user-dirs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-gfortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-gnat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-objc++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-plugin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnat-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmudflap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmudflap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmudflap-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcs-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync-qdevice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync-qnetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosynclib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosynclib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-command-not-found</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-yum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-yum-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-ng-i18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-archiver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-archiver-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnupg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnupg2-smime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-NetworkManager-dispatcher</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-aliases</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-auto-update-debug-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-changelog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-copr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-fastestmirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-filter-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-fs-snapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-keys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-list-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-merge-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-ovl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-post-transaction-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-pre-transaction-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-priorities</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-protectbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-remove-with-leaves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-rpm-warm-cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-show-leaves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-tmprepo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-tsflags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-upgrade-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-verify</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-plugin-versionlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-updateonboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yum-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk3-vala</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-builder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>egl-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeglut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeglut-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glx-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>intel-gpu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-egl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-gles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-glx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglvnd-opengl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libwayland-egl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libwayland-egl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-vdpau-drivers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-ati</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-dummy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-evdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-evdev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-fbdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-intel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-libinput</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-libinput-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-mouse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-mouse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-openchrome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-openchrome-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-qxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-synaptics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-synaptics-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-v4l</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-vesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-vmmouse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-vmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-void</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-wacom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-drv-wacom-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-font-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xspice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-xkb-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-xkb-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-xkb-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdcraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdcraw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OVMF</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adwaita-cursor-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adwaita-gtk2-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adwaita-icon-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adwaita-icon-theme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>appstream-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at-spi2-atk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at-spi2-atk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at-spi2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at-spi2-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>baobab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bolt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brasero</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brasero-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brasero-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brasero-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-gobject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cheese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cheese-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cheese-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-gst3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-gst3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-exiv2-023</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-libical1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>control-center</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>control-center-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dconf-editor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>devhelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>devhelp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>devhelp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ekiga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-ews</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-ews-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-help</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-mapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-mapi-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-pst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>folks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>folks-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>folks-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-pam-extensions-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-bookmarks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-bracketcompletion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-charmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-codecomment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-colorpicker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-colorschemer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-commander</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-drawspaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-findinfiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-joinlines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-multiedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-smartspaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-synctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-terminal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-textsize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-translate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugin-wordcompletion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit-plugins-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geoclue2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geoclue2-demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geoclue2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geoclue2-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geocode-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geocode-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gjs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gjs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gjs-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glade-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glade-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibmm24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibmm24-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibmm24-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-backgrounds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-bluetooth-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-bluetooth-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-boxes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-calculator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-classic-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-clocks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-color-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-contacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop3-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-dictionary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-disk-utility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-documents-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-font-viewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-getting-started-docs-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-initial-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-miners</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-packagekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-packagekit-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-packagekit-installer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-packagekit-updater</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screenshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session-wayland-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-alternate-tab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-apps-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-auto-move-windows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-dash-to-dock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-drive-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-launch-new-instance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-native-window-placement</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-no-hot-corner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-panel-favorites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-places-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-screenshot-window-sizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-systemMonitor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-top-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-updates-dialog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-user-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-window-list</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-windowsNavigator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-workspace-indicator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-software</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-software-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-software-editor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-system-monitor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-terminal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-terminal-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-themes-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-tweak-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-user-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gobject-introspection</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gobject-introspection-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gom-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-noto-emoji-color-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-noto-emoji-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsettings-desktop-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsettings-desktop-schemas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gspell-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssdp-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssdp-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-update-icon-cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtksourceview3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtksourceview3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtksourceview3-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gucharmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gucharmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gucharmap-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gupnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gupnp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gupnp-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gupnp-igd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gupnp-igd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gupnp-igd-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-afc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-afp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-archive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-goa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-gphoto2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-mtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-smb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-glib-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libappstream-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libappstream-glib-builder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libappstream-glib-builder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libappstream-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libchamplain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libchamplain-demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libchamplain-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libchamplain-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdata-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgee-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgepub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgepub-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgexiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgexiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomekbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomekbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgovirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgovirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgweather</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgweather-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgxps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgxps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgxps-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-glib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmediaart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmediaart-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmediaart-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-vala</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpeas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpeas-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpeas-loader-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsecret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsecret-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-cursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-egl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwayland-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwnck3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwnck3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs52-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-sendto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osinfo-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-gexiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pyatspi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seahorse-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shotwell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sushi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>totem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>totem-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>totem-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>totem-pl-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>totem-pl-parser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>turbojpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>turbojpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>upower</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>upower-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>upower-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vala</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vala-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vala-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valadoc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte291</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte291-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wayland-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wayland-protocols-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk4-jsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk4-jsc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk4-plugin-process-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-xsl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zenity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-pem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-api-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-client-xlators</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-rdma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-instaweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc-zip-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sos-collector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keepalived</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CPAN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-CBuilder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO-Zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Locale-Maketext-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-CoreList</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Loaded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Object-Accessor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Package-Constants</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Pod-Escapes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Time-Piece</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_auth_mellon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_auth_mellon-diagnostics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular-part</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-aliyun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-amt-ws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-apc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-apc-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-aws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-azure-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-bladecenter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-brocade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-cisco-mds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-cisco-ucs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-drac5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-eaton-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-emerson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-eps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-gce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-heuristics-ping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-hpblade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ibmblade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ifmib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo-moonshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo-mp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-intelmodular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ipdu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ipmilan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-redfish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-rhevm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-rsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-sbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-virsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-vmware-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-vmware-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-wti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exempi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exempi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-libtiff3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libGLw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mesa-libGLw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-kafka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmkubernetes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_auth_openidc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-assistant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-designer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-doctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-linguist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qdbusviewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtcanvas3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtcanvas3d-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtcanvas3d-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtgraphicaleffects</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtgraphicaleffects-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtimageformats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtimageformats-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-libs-designer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-libs-designercomponents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-libs-help</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttranslations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtx11extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtx11extras-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtx11extras-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keycloak-httpd-client-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-keycloak-httpd-client-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcm_colors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-settings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-settings-ksplash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-settings-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-settings-plasma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-settings-pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-style-oxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-workspace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-workspace-ksplash-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-workspace-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeclassic-cursor-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgreeter-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>khotkeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>khotkeys-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinfocenter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmenuedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksysguard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksysguard-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin-gles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin-gles-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkworkspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oxygen-cursor-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma-scriptengine-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma-scriptengine-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-settings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtuoso-opensource</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtuoso-opensource-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vinagre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blktrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-default-yama-scope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-libelf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-libelf-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-vdagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-viewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>http-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>http-parser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uriparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uriparser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-winsupport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>advancecomp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-pigeonhole</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jss-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-reportlab-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pillow-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pillow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pillow-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pillow-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-virtualenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bmc-snmp-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exchange-bmc-os-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibRaw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibRaw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibRaw-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-extra-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-disable-screenshield</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-extra-osk-keys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-horizontal-workspaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-window-grouper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcanberra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcanberra-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcanberra-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcanberra-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shared-mime-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-needle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-preferences</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xchat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xchat-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adjustbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adjustbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ae-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithms-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amscls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amscls-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anysize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anysize-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-appendix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-appendix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabxetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabxetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-avantgar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babelbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babelbib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bera-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beton-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtopic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtopic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidi-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigfoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigfoot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breakurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breakurl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caption-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlisle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlisle-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changebar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changebar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changepage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chngcntr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chngcntr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cite-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-lgc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-lgc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-super</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-super-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cns-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collectbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collectbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-documentation-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-fontsrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-htmlxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latexrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colortbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colortbl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csquotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csquotes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currfile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx-def</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eepic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enctex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enumitem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enumitem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eso-pic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eso-pic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex-pkg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoolbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoolbox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euenc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euro-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eurosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eurosym-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extsizes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extsizes-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancybox-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhdr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhdr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyvrb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyvrb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filecontents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filecontents-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filehook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filehook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fix2col</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fix2col-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixlatvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixlatvian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-float</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-float-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fmtcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fmtcount-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fncychap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fncychap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontbook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontspec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontwrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontwrap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footmisc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fpl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-framed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-framed-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garuda-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geometry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geometry-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glyphlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-helvetic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperref-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyph-utf8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyph-utf8-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifluatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifluatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifmtarg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifmtarg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifoddpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifoddpage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iftex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifxetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifxetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-index</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-index-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jknapltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jknapltx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kastrup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kastrup-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerkis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerkis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3experimental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3experimental-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3kernel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3kernel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3packages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3packages-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lastpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lastpage-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-fonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lettrine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lettrine-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-alt-getopt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-alt-getopt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexbase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecmds-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginnote-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marvosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marvosym-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpazo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpazo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdwtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdwtools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memoir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memoir-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metalogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metalogo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-examples-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfnfss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-microtype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-microtype-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-misc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnsymbol-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mparhack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mparhack-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ms-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multido</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multido-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multirow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multirow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-natbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-natbib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncctools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncntrsbk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-norasi-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntgclass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntgclass-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oberdiek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oberdiek-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overpic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-palatino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paralist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paralist-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parallel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parallel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parskip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parskip-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-passivetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpages-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-def</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philokalia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philokalia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeins-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polyglossia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polyglossia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-preprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-preprint-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfrag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfrag-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pslatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psnfss-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pspicture</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pspicture-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-3d-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-blur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-blur-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-coil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-coil-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eps-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fill-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-grad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-grad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-node-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-plot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-plot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-slpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-slpe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-text</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-text-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tree-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks-add</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks-add-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptext-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qstest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qstest-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realscripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realscripts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rotating</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rotating-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmath-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauerj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauerj-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-section</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-section-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectsty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectsty-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seminar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seminar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sepnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sepnum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-setspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-setspace-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showexpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showexpl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soul-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stmaryrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stmaryrd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfig-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfigure-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-prov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-prov-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-symbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-t2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-t2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texconfig-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive.infra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive.infra-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive.infra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textcase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textcase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textpos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textpos-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thailatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thailatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeparttable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeparttable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-times</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlesec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlesec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titling-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocloft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocloft-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfonts-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-type1cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-type1cm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typehtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typehtml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharclasses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharclasses-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulem-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underscore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underscore-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-math-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unisugar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unisugar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-url</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-url-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utopia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utopia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varwidth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varwidth-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wadalab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wadalab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-was</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-was-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasysym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasysym-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wrapfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wrapfig-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecjk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecolor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecyr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xeindex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xepersian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xepersian-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xesearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xesearch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-def</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-itrans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-itrans-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-pstricks-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-tibetan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-tibetan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexfontinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexfontinfo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xifthen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xifthen-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xkeyval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xkeyval-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xltxtra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xltxtra-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xstring-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xtab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xtab-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xunicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xunicode-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfchan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lftp-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-basic-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-example-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-plugin-python-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-plugin-python2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdkit-plugin-vddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-assistant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-devel-private</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-qdbusviewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-qvfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-autoipd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-libdns_sd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-dnsconfd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-gobject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-qt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-qt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-ui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-ui-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-ui-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2graphite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2influxdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2spark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2zabbix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-zabbix-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-collectl2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-ganglia2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-activemq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bind2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bonding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cifs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cisco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dbping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-infiniband</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lmsensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustrecomm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mailq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-memcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-named</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-netfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-news</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nfsclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nvidia-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-perfevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-prometheus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-roomtemp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-shping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-smart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-summary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-vmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-weblog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zimbra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zswap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-system-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-webapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-webapp-blinkenlights</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-webapp-grafana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-webapp-graphite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-webapp-vector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-webjs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-pygtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-lpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resource-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resource-agents-aliyun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-librepo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>targetcli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rtslib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rtslib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linuxptp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lasso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lasso-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lasso-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-exiv2-026</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-systemd-inhibit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-md5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-ntlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-scram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minizip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minizip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-compat-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-lzma-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpartx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hsqldb-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-atomic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-cpu-partitioning</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-utils-systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-dyndb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-btrfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-btrfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-crypto-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-dm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-fs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-fs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-kbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-loop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-loop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-lvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-lvm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-mdraid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-mdraid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-mpath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-nvdimm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-nvdimm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-part</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-part-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-plugins-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-swap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-swap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-vdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-vdo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-blockdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>konsole</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>konsole-part</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Find-Rule-Perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Find-Rule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pyasn1-modules</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-10.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0-14.el7.PTF.920871</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4p1-16.el7.PTF.1122802.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-2.16.el7.PTF.1122802.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-5.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.85.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.85.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.86.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.86.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-6.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-17.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-18.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-70.rc10.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-210.git7d71120.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.123.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.123.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.0.7.0-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.3-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.2-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240715-999.34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240715-999.34.git4c8fb21e.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-15.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-15.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-999.36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-999.36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.0.7.0-999.36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-999.36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-999.36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-999.36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-999.36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-999.36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.3-999.36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.2-999.36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-999.36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20241110-999.36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20241110-999.36.git95bfe086.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.8-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-4.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-15.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.0.4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.0.4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4p1-23.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-2.23.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.0.7.0-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.3-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.2-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20251030-999.44.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20251030-999.44.1.gite9292517.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-94.el7_9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-94.el7_9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.125.1.0.15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.125.1.0.15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.0.5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.0.5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-94.el7_9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-94.el7_9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-73.23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.55-2.4.7.2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.55-2.4.7.2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.1.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.1.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-34.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-34.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8e-29.el7_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.18-9.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.18-9.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.0-6.1.13.3.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.42-5.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3-5.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3-5.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.37-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.37-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11-4.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11-4.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-60.el7_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-60.el7_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.4.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.4.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.42-6.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-35.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-35.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-29.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-29.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-18.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-18.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.4.4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.4.4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-60.el7_0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-60.el7_0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-37.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-37.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.5-3.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-23.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.6.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.6.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.42-8.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4-12.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-55.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-55.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-5.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-12.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-16.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-34.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.8.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.8.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-3.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.45-5.el7_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-7.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-7.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-17.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-23.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-29.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-29.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-10.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-10.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.7-7.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-2.5.3.1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-2.5.3.1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.33-1.13.5.0.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.2.0-3.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.2.0-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-34.el7_0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-34.el7_0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-5.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-5.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-60.el7_0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-60.el7_0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-12.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.3-12.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.9.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.9.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-10.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-23.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.35-15.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.35-15.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-9.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-8.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-8.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-8.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.18-10.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.18-10.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.40-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.40-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.7-2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.353-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.353-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.353-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-22.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.3.0-3.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2.3-2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2.3-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2.3-2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-13.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.13.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.13.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.1-18.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.1-18.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.1-18.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-7.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-7.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-7.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-14.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-14.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-14.el7_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-12.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.13.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.13.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-26.el7_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-26.el7_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-55.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-55.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-19.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-19.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-29.el7_0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-29.el7_0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.4.0-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-34.el7_0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-34.el7_0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-2.5.4.2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-2.5.4.2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-26.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-26.el7_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.34-1.13.6.1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-55.el7_0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-55.el7_0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.4-11.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.20.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-123.20.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.41-2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.41-2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-7.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-7.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-38.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-38.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.0-2.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.0-1.el7_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-5.7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-5.7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-78.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-78.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.32-14.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.32-14.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3.1-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.1p1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-9.11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-14.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-14.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-18.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.4-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.4-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.4-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.0-2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.11-10.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.11-10.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-42.el7_1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-42.el7_1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.3-3.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.1.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.1.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-18.el7_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.54-3.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.17-4.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-5.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-5.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.6.0-2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-5.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-5.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.6.0-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-33.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-33.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-33.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.79-2.5.5.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.79-2.5.5.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.35-1.13.7.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.45-30.b13.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.45-30.b13.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3.1-16.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.137-13.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.54-2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-19.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.4.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.4.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.0-3.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.0-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-42.el7_1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-42.el7_1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-22.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-22.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-22.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-23.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-23.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-17.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-42.el7_1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-42.el7_1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-17.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-17.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-17.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-36.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.7.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.7.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-21.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12-10.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-3.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-3.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-7.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-7.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.13-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.13-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.1.0-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.51-1.b16.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.51-1.b16.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-2.6.1.2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-2.6.1.2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.8.0-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60-7.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60-7.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.4-12.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.4-12.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.36-1.13.8.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.11.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.11.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.1.1-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.0-4.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-6.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-6.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-6.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-20.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-20.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-12.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.44-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.44-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-31.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-31.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.0-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.1-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-5.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-14.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2.3-13.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.137-13.el7_1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-18.el7_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.7-3.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-9.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-4.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-7.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-7.el7_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.14.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.14.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.3.0-2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.39-7.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.39-7.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.3.0-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-9.el7_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-41.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.65-2.b17.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.65-2.b17.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-2.6.2.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-2.6.2.1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-19.el7_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-19.el7_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-86.el7_1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.20.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-229.20.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-5.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-2.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-7.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-7.el7_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-4.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.4.0-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.14-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.14-1.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.52.0.1-55.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.52.0.1-55.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.37-1.13.9.4.el7_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.1p1-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-9.22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-34.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-34.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-24.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.40-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.40-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-25.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-25.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-106.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-106.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.8-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.1-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-105.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-105.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.92-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.143-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-8.git20130913.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-8.git20130913.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-27.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-27.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-24.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-24.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0-40.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0-40.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.0-40.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.35-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.35-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.13-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.13-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.14-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.14-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.29.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.7-54.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.20-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-35.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-35.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-35.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.4.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-22.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.3.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.3.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.50-7.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-7.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.33.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.5.0-3.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.5.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-33.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-11.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-11.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-11.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-19.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-19.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.20-1.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.20-1.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-14.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-14.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.1p1-23.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-9.23.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.71-2.b15.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.71-2.b15.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-2.6.4.0.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-2.6.4.0.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-22.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-22.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.4.5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.4.5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.38-1.13.10.0.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-105.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-105.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-106.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-106.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.10.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.10.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-35.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-6.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-6.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.1-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4.0-26.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.15-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.15-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-9.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8e-29.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-10.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-10.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-8.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-8.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-12.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-12.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-12.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.1p1-25.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-9.25.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-6.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-6.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-2.6.5.0.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-2.6.5.0.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.77-0.b03.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.77-0.b03.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-12.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-12.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.10-6.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.10-6.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-15.el7_2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.25-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.25-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.5-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.26-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-10.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-10.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-10.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.26-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.10-6.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.91-0.b14.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.91-0.b14.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.101-2.6.6.1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.101-2.6.6.1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.0-9.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2.3-14.2.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.0-9.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.0-2.2.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.1.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-6.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.39-1.13.11.0.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-105.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-105.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.8.9-13.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.8.9-13.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.32-15.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.32-15.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.18.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.18.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.8.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-6.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-26.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-22.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-22.el7_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-15.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.2.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.8.9-15.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.8.9-15.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.22.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.22.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.24-4.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.59-2.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.01.0-22.7.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.2-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-40.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-40.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.101-3.b13.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.101-3.b13.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.10-7.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.10-7.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.10-7.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.111-2.6.7.2.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.111-2.6.7.2.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-1.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-1.el7_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.28.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.28.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-25.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-25.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.3.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.50-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.50-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-105.el7_2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-105.el7_2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-36.3.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-38.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-38.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.28.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.28.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.40-1.13.12.5.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-15.el7_2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.3.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-10.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-10.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.36.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.36.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.4.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-51.el7_2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-29.el7_2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.0-5.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.4.0-1.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.54-8.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.36.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.36.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.111-1.b15.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.111-1.b15.el7_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.36.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-327.36.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-157.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-157.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-35.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-35.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.7-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.7-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.15-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.15-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.28-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.28-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-25.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-25.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-126.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-48.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-48.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.1p1-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-9.31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.16-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.16-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-47.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-47.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5.10-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.52-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.52-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.152-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3.2-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-42.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.69-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.95-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.95-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.2-33.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.2-33.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.18-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.18-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-30.el7_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-30.el7_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.15-11.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.15-11.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.121-2.6.8.0.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.121-2.6.8.0.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-13.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-2.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-2.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-1.1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-13.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.15-10.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.15-10.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-10.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-21.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-21.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.160-1.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-14.el7_3.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-14.el7_3.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-20.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-20.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-20.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-22.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-22.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-12.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-12.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-3.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-6.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.41-1.13.13.1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-126.el7_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.6.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.6.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-0.b13.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-0.b13.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-0.b13.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-2.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.7.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-27.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-27.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.7.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-25.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-25.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.4-20.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.131-2.6.9.0.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.131-2.6.9.0.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-60.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1e-60.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.6.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.6.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.10.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.10.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-14.el7_3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-14.el7_3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-126.el7_3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.0-4.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.8.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.0-5.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.3-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-16.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-16.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-45.el7_3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-45.el7_3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.2-33.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.2-33.el7_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5.10-20.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.16.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.16.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.69-11.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-126.el7_3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-38.el7_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-1.0.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-1.0.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1.0-2.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.131-2.b11.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.131-2.b11.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.131-2.b11.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.141-2.6.10.1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.141-2.6.10.1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-30.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-30.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-20.el7_3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-20.el7_3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-20.el7_3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-38.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.4-0.8.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-6.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-6.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-6.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-13.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-13.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-13.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-14.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-14.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-14.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.21.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.21.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-1.2.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-1.2.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-22.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-22.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-126.el7_3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.2.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-157.el7_3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-157.el7_3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.21.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.21.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.2.0-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-23.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.6p7-23.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-7.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-8.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-8.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.26.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-514.26.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-50.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-50.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-50.el7_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-126.el7_3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.141-1.b16.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.141-1.b16.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.141-1.b16.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-1.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.69-12.el7_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.11-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.11-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-141.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.74-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.13-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.9-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.12-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.11-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.74-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.1-6.20170307.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.1-6.20170307.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.39.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.39.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-58.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-58.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-196.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-196.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.46-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.21-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.21-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-42.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-42.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4p1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-1.11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.18-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-23.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-23.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.31-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.26-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.26-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.26-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.3-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.3-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.56-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.56-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.8-30.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.26-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.26-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.28-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.28-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.1-5.2.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.1-5.2.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-8.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-8.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-16.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.151-2.6.11.1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.151-2.6.11.1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-141.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0-2.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.0-4.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.8-2.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.1.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.1.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-67.el7_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-67.el7_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.9-8.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-8.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.20-7.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-17.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-17.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.2.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.2.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.44-4.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.44-4.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.23-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.23-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-20.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-20.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.4-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.76-2.el7_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-67.el7_4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-67.el7_4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0-2.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-5.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.5.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.5.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.151-1.b12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.151-1.b12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-15.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-3.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-11.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-43.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-42.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-42.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-36.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.8-3.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.11.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.11.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-141.el7_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-50.el7_4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-50.el7_4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-50.el7_4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.1-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-12.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.161-2.6.12.0.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.161-2.6.12.0.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.23-3.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.23-3.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.11.6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.11.6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-22.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-57.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-57.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.0.7.0-57.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-57.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-57.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-57.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-57.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-57.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.3-57.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.2-57.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-57.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170606-57.gitc990aae.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-141.el7_4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-14.el7_4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-14.el7_4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.2-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-22.5.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.0.7.0-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.3-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.2-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-58.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170606-58.gitc990aae.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.161-0.b14.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.161-0.b14.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-51.el7_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-51.el7_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-51.el7_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.17.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.17.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-58.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-58.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6.1-26.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.3-4.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-42.el7_4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-42.el7_4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.171-2.6.13.0.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.171-2.6.13.0.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-4.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-4.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.22.4-5.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.22.4-5.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14.1-33.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.21.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-693.21.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-43.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6.1-28.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-58.el7_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-58.el7_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-26.el7_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.2-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-4.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.0-1.el7_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-18.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-18.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-222.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-222.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-156.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4p1-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-2.16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-12.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.162-5.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.3-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-2.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-2.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-7.b10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-7.b10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-10.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.12-1.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-2.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-2.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-2.6.14.5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-2.6.14.5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.2.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.2.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7.5-21.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-14.el7_5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-14.el7_5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-156.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-68.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-68.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.3.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.3.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-14.el7_5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-14.el7_5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-156.el7_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-2.6.14.8.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-2.6.14.8.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-8.b10.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-8.b10.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-17.el7_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-17.el7_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-9.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-5.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.3.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.3.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-14.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-14.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.6.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.6.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.1-13.1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.1-13.1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-14.el7_5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-14.el7_5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-156.el7_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.11-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.11-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.1.0-4.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-69.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-69.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.22-5.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-7.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-7.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-3.b13.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-3.b13.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.1-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.31-46.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.191-2.6.15.4.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.191-2.6.15.4.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.11.6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.11.6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.60-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.60-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-156.el7_5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.21-28.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-61.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-61.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-61.el7_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.0-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34-3.el7_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34-3.el7_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-2.el7_5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.14.4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-862.14.4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7.5-28.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.8-4.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-7.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-7.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.1-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.2-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-4.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-29.el7_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-29.el7_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-29.el7_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-8.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.191.b12-0.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.191.b12-0.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3.0-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-34.base.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-34.base.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-76.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-76.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.29-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.29-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-18.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.3-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.3-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.3-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.91-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.0-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.917-28.20180530.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.15-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.91-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-0.8.git5baa1e5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.7-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.5-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.5-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.73.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.73.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.7-1.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.6-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.6-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.917-28.20180530.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.15-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-3.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.5-4.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-49.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1.0-1.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1-1.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-2.el7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.36.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.36.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2018.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5-23.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7-14.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.7-14.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-34.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-34.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2-31.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180508-3.gitee3198e672e2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-260.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-260.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8.4-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.50-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.50-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7-20180614.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.2-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.2-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.12-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.26-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.0-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.1-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.13-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-4.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-4.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.12-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.12-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.52.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.52.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009193999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.3-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180508-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.7-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.8-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.16-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.16-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.12-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.9-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.90-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.90-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.20-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.20-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.6-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.3.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.6-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180531-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.92-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.2-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.1-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.7-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.7-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.52.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.52.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.5-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.5-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-51.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-51.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.62-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.62-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.2-18.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.92-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.71-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-33.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-33.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.2-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.2-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-0.6.alpha.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.201-2.6.16.1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.201-2.6.16.1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-5.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-5.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-5.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.1-4.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.1.13-3.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3.0-1.el7_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.1.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.1.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-3.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-8.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-8.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-8.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14.1-34.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.4.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-8.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-62.el7_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-62.el7_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-13.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.3-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9800-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.2.6-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.76.02-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.08-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.42-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.02-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.3-294.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.4.0-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.5.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.5.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-73.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-73.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-73.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-62.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-62.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-18.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-18.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-6.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.0-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-62.el7_6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-62.el7_6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.1-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-4.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-4.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.201.b09-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.201.b09-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.2.7-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.211-2.6.17.1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.211-2.6.17.1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-16.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-16.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-9.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.10.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.10.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.2-1.el7_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.0-3.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-6.git4391e5c.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-6.git4391e5c.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.1-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-12.el7_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-12.el7_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.1-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-15.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-15.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-77.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-77.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-2.el7_6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212.b04-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212.b04-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.3.7-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.221-2.6.18.0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.221-2.6.18.0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180508-3.gitee3198e672e2.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.12.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.12.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.07-31.el7_6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-3.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-5.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-5.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-10.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-10.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.12.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.12.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7_6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7_6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-160.el7_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-18.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14.1-35.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7_6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7_6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-74.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-74.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4-74.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.21.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.21.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7_6.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-10.el7_6.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-80.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-80.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-11.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1763-11.el8_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-2.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.8.0-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.8.0-1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.4.11-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222.b10-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222.b10-0.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.231-2.6.19.1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.231-2.6.19.1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.27.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-957.27.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-51.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-51.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-160.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-12.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-12.el7_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8.4-25.1.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-89.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-89.el7_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-2.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-2.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2-33.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-38.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-38.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0.648-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14.1-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-86.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-86.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.0-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-24.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-0.7.alpha.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.4-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.90-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.90-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-32.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-32.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-9.P2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-9.P2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-9.P2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-77.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-77.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-41.base.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-41.base.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-29.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-29.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-167.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.7-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.7-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.0.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.36.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.36.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-67.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-67.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.92-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.1-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-2.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-2.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-2.el7_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-38.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-38.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-292.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-292.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180508-6.gitee3198e672e2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.19-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19-23.9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.19-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.19-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.6-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4p1-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-2.21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.36.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-1.rc4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-1.rc4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.0.7.0-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.3-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.168.5.2-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-72.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190429-72.gitddde598.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.4-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.4-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.4-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.3-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.3-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-54.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-54.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.62-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.62-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.176-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.176-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.176-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.4-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-18.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.21.0-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.5-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.4.1-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.34-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.34-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-23.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-23.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-19.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-19.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.64-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.64-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-14.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-90.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-90.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.4-4.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.4-4.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.1.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.1.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19-23.10.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-11.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-11.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.8-11.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-167.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.9.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.1.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.1.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-3.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-3.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-12.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.4.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.4.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.6-3.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.5.10-0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.232.b09-0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.232.b09-0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.241-2.6.20.0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.241-2.6.20.0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-4.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-4.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-46.1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.4.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.4.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.4.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.4.3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-2.el7_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-14.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-4.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.7.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.7.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9.1-12.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-15.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-7.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-8.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-7.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-4.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-8.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-8.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-2.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.6.10-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-21.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-21.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-15.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-9.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242.b08-0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242.b08-0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-14.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-14.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-8.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-8.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-8.el7_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-2.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-2.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-167.el7_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.12.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.12.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-11.el7_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-11.el7_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-2.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-4.el7_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-4.el7_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.251-2.6.21.0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.251-2.6.21.0.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-3.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.1-3.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20120801-140.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-20.gitd1c6db8.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-20.gitd1c6db8.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-34.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-34.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-8.el7_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-10.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-10.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.18.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1062.18.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-7.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-4.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2-34.el7_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-11.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:50.2-4.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:50.2-4.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:50.2-4.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-1.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-14.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18-9.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.18-9.el7_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-52.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-52.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-57.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-57.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.4-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.50-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.50-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-24.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.1-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.30-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.3-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.3.1-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190805-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.8-25.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2012-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26555.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.0.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29207.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29208.3.04-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29327.2.14-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.2b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17470.v1.1.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21866.v1.5b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28614.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24756.3.8m-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25245.1.31-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2012-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29349.3.26-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20031.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.0.99d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26509.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.1a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29650.12.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.61803-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.30-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29026.3.3__2013_02_03_-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18258.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29349.3.5c-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.0c-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17157.1.0a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19955.5.3-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26296.4.8.3-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29581.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28250.0.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26568.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn14075.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26557.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26314.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17091.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28082.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28251.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25030.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25795.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29634.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25394.v1.0a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24393.5.1d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26694.1.23-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29012.0.7b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19834.2.58-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.0.13.2d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn13663.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26765.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.1.14-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29585.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25033.1.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.1e-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28602.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24146.3.5.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21461.2.7.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26577.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18336.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21515.2.0c-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22198.2.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20922.2.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19795.0.1h-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17261.2.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22191.1.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17265.1.4_subrfix-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17263.1.4a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18304.1.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.3.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.0.9c-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18492.2.8-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24250.1.3-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24280.0.5d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17133.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21631.1a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.3d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28068.2.02-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20710.v1.34-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn23608.0.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29412.v2.3a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn23330.5.5b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.002-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26789.0.96-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19716.5.6-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28576.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25405.1.0o-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.1.19.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28213.6.83m-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29641.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29197.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.3c-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24853.1.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26725.1.3-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19363.1.2a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn23979.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29654.0.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19685.0.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24099.4.1beta-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn23409.3.13-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn3006.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19440.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27255.3.11b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28792.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27347.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2012-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29361.SVN_4467-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29409.SVN_4469-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28985.1.2l-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27907.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn14050.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28888.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28991.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29391.1.64-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28119.2.004-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29044.1.958-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21927.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29349.0.7.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29346.1.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26718.1.26-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18579.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.0.70.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26912.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22560.0.31-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.2.12-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25880.v1.1i-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29349.2.2a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.003-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.0.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.05.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21638.3.6j_patch_6.0g-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.2.718281-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18611.0.12-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.1.212-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17487.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19410.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29420.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29392.2.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24955.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18651.1.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18674.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24467.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18302.1.42-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17256.1.6-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20668.8.31b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.3.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26725.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19712.0.53-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.3b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19963.2.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27574.0.4t-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29585.1.40.11-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27321.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22653.0.06d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22614.2.10-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18651.1.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19848.2.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26647.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26163.v1.2.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25656.1.4i-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn16085.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.3.04-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn16416.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn23394.9.2a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17257.1.10-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24020.1.06-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.01-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.06-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20176.0.61-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27799.1.25-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28729.1.44-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24391.1.31-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.00-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24142.1.12-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29678.2.39-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28750.3.59-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28124.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29423.0.3b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn16832.2.16b-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17997.1.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn25923.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20180.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.0.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18322.1.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20186.2.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24881.6.7a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27790.v0.3j-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.4-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22027.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.1.3-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.1.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18017.3.1862-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29349.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29585.3.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27344.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.3.1415926-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18651.2.004-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29045.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29474.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28217.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22566.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28261.1.7h-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29349.0.5.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17383.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.3.15-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn6898.0-45.20130427_r30134.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29349.1.3-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24852.2.10.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.1d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20084.2.3e-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26263.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21820.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17134.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27820.2.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27549.2.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn16791.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26785.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn18261.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29413.0.7d-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22357.0.92-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn16864.3.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24104.0.92-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22576.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn21439.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn22048.3.6-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn15878.2.11-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26689.22.85-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28816.3.1.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29660.0.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn20221.1.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn16760.0.2-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29661.12.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn16041.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn26330.0.9997.5-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29154.0.95-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn24105.4.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn17055.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28847.0.1-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28819.0-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn27995.2.6a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn19809.0.5e-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn28273.0.8-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn29258.1.7a-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn23347.2.3f-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:svn23897.0.981-45.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.8-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.8-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.14-24.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.14-24.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-43.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-43.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-43.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-30.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-16.P2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-16.P2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-16.P2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-42.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-42.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.5-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-47.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-47.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.0-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.65-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.65-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.44-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.44-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.16-48.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.46-34.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-173.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-93.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-93.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.21-29.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-88.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-88.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-26.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-8.20130218git.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-8.20130218git.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.31-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.31-20.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.62-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.62-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.10.68-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.10.68-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-38.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-23.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-23.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.92.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-173.el7_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17-65.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.1-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-2.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.261-2.6.22.2.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.261-2.6.22.2.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.7.10-4.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-22.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-22.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252.b09-2.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252.b09-2.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.0-7.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-15.el7_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-7.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-4.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.8.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.8.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-23.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-23.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-16.P2.el7_8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-16.P2.el7_8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-16.P2.el7_8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-4.rc4.el7_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-4.rc4.el7_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-4.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-4.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-61.6.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-12.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-7.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-7.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-5.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-5.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-29.el7_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-29.el7_8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.13.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.13.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.10.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.24-14.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.24-14.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.24-14.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.10.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.262.b10-0.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.262.b10-0.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.8.10-0.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.18.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1127.18.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.11.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-14.el7_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1002-8.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.11.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.12.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-6.el7_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.36-6.el7_8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.12.0-1.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-0.8.alpha.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-317.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-317.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-51.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-51.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-51.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-17.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.2-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-11.20101004cvs.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-21.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.76-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-21.gitd1c6db8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-21.gitd1c6db8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-17.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.4-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009194999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-35.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3-35.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-175.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-28.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-89.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-89.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-59.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-59.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.git4391e5c.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.git4391e5c.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-44.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-12.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-95.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-95.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20120731b-13.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.8-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.14-16.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.2-10.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-43.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.5-43.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-5.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.13-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-36.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.44-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.44-7.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.8-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-6.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-78.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-78.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.9-19.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.9-19.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-9.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-4.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.68-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.68-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-3.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-3.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-3.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.24-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.24-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.24-15.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-8.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-22.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.12-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-175.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-17.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-9.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9.11-0.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272.b10-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272.b10-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-14.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-14.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.7-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.7-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-59.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-59.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-41.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-61.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-90.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-90.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-18.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.76-16.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.7-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.6.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.6.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-36.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-36.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-73.2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.3-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-49.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.2-49.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.53-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.74-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.11.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.11.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.35-27.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.35-27.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.23-1.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.23-1.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-21.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-21.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.10.68-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.10.68-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.76-16.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-10.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-10.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.15.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.15.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-80.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200421-80.git78c0348.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.3-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9800-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.2.6-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.76.02-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.08-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.42-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.02-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.3-299.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-175.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-322.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-322.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-10.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-10.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:295-3.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-0.27.20120314git3c2946.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-12.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.21.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.21.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.24.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.24.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-17.el7_9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.11.0.9-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292.b10-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292.b10-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-13.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.56.5-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-16.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-16.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-16.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-10.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-10.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-73.9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.31.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.31.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-6.11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-6.11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-175.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10.2-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-83.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-83.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-2.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-14.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.36.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.36.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.12.0.7-0.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302.b08-0.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302.b08-0.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-73.11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-4.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-4.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27.0-4.el7_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-12.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-12.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.7-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.7-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.41.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.41.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-6.12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10-6.12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.42.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.42.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.14.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.14.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-22.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-22.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.45.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.45.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10.2-13.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-97.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-97.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312.b07-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312.b07-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.13.0.8-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-16.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-44.base.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-44.base.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-12.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.49.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.49.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4p1-22.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-2.22.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.3-48.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.3-48.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.3-48.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-51.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-51.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.67.0-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.67.0-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-30.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-17.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-17.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-17.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-17.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-17.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-17.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-3.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.53.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.53.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-97.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-97.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-19.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.14.0.9-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-26.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.112-26.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322.b06-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322.b06-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-18.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-18.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-18.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1-13.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-23.gitd1c6db8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-23.gitd1c6db8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.59.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.59.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.44-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10.2-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-97.el7_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-97.el7_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-14.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.62.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.62.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.15.0.9-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.332.b09-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.332.b09-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-20.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.66.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.66.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-57.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.0-57.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.10.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.10.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.0-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.71.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.71.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-92.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-92.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10.2-16.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.11.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.11.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-17.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.16.0.8-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.342.b07-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.342.b07-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.12.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.12.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-18.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-18.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-18.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.76.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.76.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-78.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-78.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.13.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.13.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.5-3.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-17.el7_9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352.b08-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352.b08-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.17.0.8-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.4.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.10.2-17.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.4.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.9-136.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.9-136.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.80.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.80.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.169-3.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-19.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-19.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-19.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1.3-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.el7_9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.el7_9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-19.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.6.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.6.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-21.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-21.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-21.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.11.8-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.11.8-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.18.0.10-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.362.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.362.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-10.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-10.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.12-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.83.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.83.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.1-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-22.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-22.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-22.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.8.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.8.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.16-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.88.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.88.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.109-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-21.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.0-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.0-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.9.0-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-26.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-26.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.9.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-98.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-98.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.10.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.10.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.19.0.7-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372.b07-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372.b07-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.90.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.90.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-11.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.11.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-6.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-6.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.11.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-23.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-23.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-93.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-93.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-19.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.12.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.12.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-3.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.5-3.el7_9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.13.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.13.0-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.95.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.95.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382.b05-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382.b05-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.20.0.8-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.7-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4p1-23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-2.23.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.14.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.14.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-52.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-52.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-52.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.99.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.99.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.5-3.el7_9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.10.68-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9.10.68-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-4.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-4.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.102.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.102.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.21.0.9-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392.b08-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392.b08-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-17.el7_9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-21.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-94.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.5-94.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.5-3.el7_9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.105.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.105.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-26.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-26.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.5.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.5.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-81.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200421-81.git78c0348.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-59.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.29.0-59.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-28.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-28.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-25.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.4-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.6.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.6.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7_9.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7_9.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402.b06-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402.b06-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.22.0.7-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.23-24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-27.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-27.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009195643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-27.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.4-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-24.gitd1c6db8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-24.gitd1c6db8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.108.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.108.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.7.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.7.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-31.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-31.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-82.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200421-82.git78c0348.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-25.gitd1c6db8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-25.gitd1c6db8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.8.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.8.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-13.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.6-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-7.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.114.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.114.2.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-29.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-29.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-29.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-17.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.23.0.9-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.10.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.el7_9.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-0.87.el7_9.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.118.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.118.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-33.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-33.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.11.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.11.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-326.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-326.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11.1-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:458-10.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.1-7.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-83.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5-83.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.8-5.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.32.2.9-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228.61.2.24-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.221.4.1-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-83.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200421-83.git78c0348.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.0-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-13.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-13.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.1-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-32.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.18-32.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422.b05-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422.b05-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.24.0.8-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.7-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11.1-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-15.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.2.0-10.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-7.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.125.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.125.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11.1-7.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.35-29.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.35-29.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-78.el7_9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:219-78.el7_9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-4.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-2.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-10.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-10.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-3.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.20-17.el7_9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-34.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.7-3.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-12.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-73.24.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-326.el7_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-326.el7_9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-32.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-32.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-32.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-36.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-36.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.462.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.462.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.28.0.6-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.28.0.6-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-10.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.23-10.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.136.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.136.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.2.0-10.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-25.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3.1-25.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-7.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.5-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-9.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-9.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.17-9.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-5.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.132.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.132.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-55.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.137.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.137.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-14.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-14.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.138.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.138.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.6-99.el7_9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.139.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.139.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-45.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-45.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-52.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-52.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-52.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.141.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.141.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.472.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.472.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.29.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.29.0.7-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-10.el7_9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.142.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.142.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-23.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-23.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-36.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-36.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.11.4-26.P2.el7_9.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.143.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.143.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-12.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.144.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.144.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.133.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.133.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.el7_9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-36.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-36.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-30.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-30.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.4-30.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.452.b09-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.452.b09-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.27.0.6-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.27.0.6-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.134.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.134.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.24-9.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.6-8.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.135.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.135.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-21.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.74-8.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-6.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-8.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-8.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-4.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-1.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.22-1.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-2.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.33-5.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.3-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9800-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.2.6-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.76.02-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.08-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.42-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.02-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.16.3-299.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.145.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.145.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.30.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.30.0.7-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.482.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.482.b08-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.146.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.146.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.56.1-11.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-26.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2k-26.el7_9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-21.el7_9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.147.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0-1160.147.1.el7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.9-7.el7_9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-21.el7_9.4</evr>
  </rpminfo_state>
</states>
</oval_definitions>
